Escolar Documentos
Profissional Documentos
Cultura Documentos
2.1 www.suse.com
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons At-
tribution-Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is avail-
able at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with
CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the
original version.
Red Hat, as a licensor of these documents, waives the right to enforce, and agrees not to assert,
Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity
Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java®
is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics In-
ternational Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a reg-
istered trademark of MySQL AB in the United States, the European Union and other countries. All
other trademarks are the property of their respective owners.
For Novell trademarks, see the Novell Trademark and Service Mark list http://
www.novell.com/company/legal/trademarks/tmlist.html. Linux* is a registered
trademark of Linus Torvalds. All other third party trademarks are the property of their respective
owners. A trademark symbol (®, ™ etc.) denotes a Novell trademark; an asterisk (*) denotes a third
party trademark.
All information found in this book has been compiled with utmost attention to detail. However, this
does not guarantee complete accuracy. Neither Novell, Inc., SUSE LINUX Products GmbH, the au-
thors, nor the translators shall be held liable for possible errors or the consequences thereof.
Contents
About This Guide ix
1 Available Documentation ......................................................................... ix
2 Feedback ............................................................................................... x
3 Documentation Conventions ..................................................................... xi
1 Navigation 1
1.1 Entitlement Views ................................................................................ 2
1.2 Categories and Pages ............................................................................ 2
1.3 Patch Alert Icons ................................................................................. 7
1.4 Quick Search ....................................................................................... 7
1.5 Systems Selected .................................................................................. 8
1.6 Lists ................................................................................................... 8
3 Overview 15
3.1 Your Account ..................................................................................... 17
3.2 Your Preferences ................................................................................ 19
3.3 Locale Preferences .............................................................................. 20
3.4 Subscription Management .................................................................... 20
3.5 Organization Trusts ............................................................................. 20
4 Systems 21
4.1 Overview — [Mgmt] .......................................................................... 21
4.2 Systems ............................................................................................. 21
4.3 System Groups — [Mgmt] ................................................................... 52
4.4 System Set Manager — [Mgmt] ............................................................. 55
4.5 Advanced Search — [Mgmt] ................................................................ 65
4.6 Activation Keys — [Mgmt] .................................................................. 68
4.7 Stored Profiles — [Mgmt] ................................................................... 74
4.8 Custom System Info — [Prov] ............................................................. 74
4.9 Autoinstallation — [Prov] .................................................................... 75
5 Patches 101
5.1 Relevant Patches ............................................................................... 102
5.2 All Patches ...................................................................................... 102
5.3 Advanced Search .............................................................................. 106
5.4 Manage Patches ................................................................................ 107
6 Channels 111
6.1 Software Channels ............................................................................ 111
6.2 Package Search ................................................................................. 116
6.3 Manage Software Channels ................................................................. 117
7 Audit 123
7.1 CVE Audit ...................................................................................... 123
7.2 OpenSCAP ...................................................................................... 127
9 Configuration 141
9.1 Preparing Systems for Config Management ........................................... 141
9.2 Overview ......................................................................................... 142
9.3 Configuration Channels ...................................................................... 143
9.4 Configuration Files ............................................................................ 146
9.5 Systems ........................................................................................... 149
10 Schedule 151
10.1 Pending Actions .............................................................................. 152
10.2 Failed Actions ................................................................................. 152
10.3 Completed Actions .......................................................................... 152
10.4 Archived Actions ............................................................................ 153
10.5 Action Chains ................................................................................. 153
10.6 Actions List .................................................................................... 154
13 Admin 175
13.1 Admin > Setup Wizard ..................................................................... 175
13.2 Admin > Organizations ..................................................................... 176
13.3 Admin > Subscriptions ...................................................................... 177
13.4 Admin > Users ................................................................................ 177
13.5 Admin > SUSE Manager Configuration ................................................ 177
13.6 Admin > ISS Configuration ................................................................ 180
13.7 Admin > Task Schedules ................................................................... 182
13.8 Admin > Task Engine Status .............................................................. 185
13.9 Admin > Show Tomcat Logs .............................................................. 185
14 Help 187
14.1 SUSE Manager Installation & Troubleshooting Guide ........................... 187
14.2 SUSE Manager User Guide .............................................................. 187
14.3 SUSE Manager Proxy Quick Start ..................................................... 188
14.4 SUSE Manager Reference Guide ....................................................... 188
14.5 SUSE Manager Client Configuration Guide ......................................... 188
14.6 Release Notes ................................................................................. 189
14.7 Search ........................................................................................... 189
This manual explains the features of the Web interface and is intended for SUSE Man-
ager administrators and administrators with restricted roles for specific tasks. On cer-
tain topics we also provide background information, while some chapters contain links
to additional documentation resources. The latter include additional documentation
available on the installed system as well as documentation on the Internet.
For an overview of the documentation available for your product and the latest
documentation updates, refer to http://www.suse.com/documenta
tion/suse_manager/ or to the following section.
HTML versions of the manuals are also available from the Help tab of the SUSE Man-
ager Web interface.
Although this manual reflects the most current information possible, read the
SUSE Manager Release Notes for information that may not have been avail-
able prior to the finalization of the documentation. The notes can be found at
http://www.suse.com/documentation/suse_manager/.
1 Available Documentation
The following manuals are available on this product:
HTML versions of the product manuals can be found in the installed system under /
usr/share/doc/manual. Find the latest documentation updates at http://
www.novell.com/documentation where you can download PDF or HTML
versions of the manuals for your product.
2 Feedback
Several feedback channels are available:
To report bugs for a product component, log into the Novell Customer Center from
http://www.suse.com/support/ and select My Support > Service Re-
quest.
User Comments
We want to hear your comments about and suggestions for this manual and the
other documentation included with this product. Use the User Comments fea-
ture at the bottom of each page in the online documentation or go to http://
www.suse.com/documentation/feedback.html and enter your com-
ments there.
x User Guide
Mail
For feedback on the documentation of this product, you can also send a mail to
doc-team@suse.de. Make sure to include the document title, the product ver-
sion and the publication date of the documentation. To report errors or suggest en-
hancements, provide a concise description of the problem and refer to the respec-
tive section number and page (or URL).
3 Documentation Conventions
The following typographical conventions are used in this manual:
• Alt, Alt + F1: a key to press or a key combination; keys are displayed with uppercase
letters as on a keyboard.
• ►amd64 em64t: This paragraph is only relevant for the specified architectures. The
arrows mark the beginning and the end of the text block. ◄
The left navigation bar is divided into pages. The links are context-sensitive. The Fig-
ure 1.2, “Left Navigation Bar—Users” (page 1) is an example of the left naviga-
tion bar for the Users tab.
Some pages have subtabs. These tabs offer an additional layer of granulari-
ty in performing tasks for systems or users. Figure 1.3, “Subtabs—System
Details” (page 2) is a menu bar for all System Details subtabs. This system has
Management and Provisioning entitlements, but not Monitoring.
Navigation 1
Figure 1.3: Subtabs—System Details
Marker Entitlement
[Prov] Provisioning
[Mon] Monitoring
If no marker follows a category, page, or tab label in this documentation, the area de-
scribed is available to all SUSE Manager users. If a marker follows, the associated en-
titlement is required. Provisioning inherits all the functions of Management. Manage-
ment features are visible to users with Provisioning entitlement, but not vice versa.
If a marker precedes a paragraph in this documentation, only the part of the page or
tab discussed afterwards requires the indicated entitlement level. When a page or tab is
associated with a particular entitlement level, all of its tabs and subtabs require at least
the same entitlement level but may need a higher entitlement. Regardless, each tab is
identified separately.
2 User Guide
the many subpages, tabs and subtabs accessible from the left navigation bar and indi-
vidual pages. Each area of the Web interface is explained in detail later in this chapter.
• Overview — View and manage your primary account information and get help.
• Overview — Obtain a quick overview of your account. This page notifies you
if your systems need attention, provides a quick link directly to these sys-
tems, and displays the most recent patch alerts for your account.
• Systems — Select and view subsets of your systems by specific criteria, such
as Virtual Systems, Unentitled, Recently Registered, Proxy, and Inactive.
• Custom System Info — [Prov] — Create and edit system information keys
with completely customizable values assigned while provisioning systems.
• Channels — View and manage the available SUSE Manager channels and the files
they contain.
• Software Channels — View a list of all software channels and those applica-
ble to your systems.
• Package Search — Search packages using all or some portion of the package
name, description, or summary, with support for limiting searches to support-
ed platforms.
• Manage Software Channels — [Prov] — Create and edit channels used to de-
ploy configuration files.
4 User Guide
• CVE Audit — View a list of systems with their patch status regarding a given
CVE (Common Vulnerabilities and Exposures) number.
• Configuration — Keep track of and manage configuration channels, actions, and in-
dividual configuration files.
• Configuration Files — List and create files from which systems receive con-
figuration input.
• Pending Actions — List scheduled actions that have not been completed.
• Completed Actions — List scheduled actions that have been completed. Com-
pleted actions can be archived at any time.
Navigation 5
• Scout Config Push — [Mon] — Display the status of your monitoring infra-
structure.
• Admin (visible only to SUSE Manager administrators) — Use the Setup Wizard to
configure SUSE Manager. List, create, and manage one or more SUSE Manager or-
ganizations. The SUSE Manager administrator can assign channel entitlements, cre-
ate and assign administrators for each organization, and other tasks.
• Subscriptions — List and manage the software and system entitlements for all
organizations covered by SUSE Manager.
• Users — List all users known by SUSE Manager, across all organizations.
Click individual user names to change administrative privileges of the user.
NOTE
• ISS Configuration — Configure master and slave servers for inter-server syn-
chronization.
6 User Guide
• Task Engine Status — View the status of the various tasks of the SUSE Man-
ager task engine.
• Show Tomcat Logs — Display the log entries of the Tomcat server, on which
the SUSE Manager server is running.
Throughout SUSE Manager you will see three patch (errata) alert icons. repre-
In the Overview page, click on the patch advisory to view details about the patch or
click on the number of affected systems to see which are affected by the patch alert.
Both links take you to tabs of the Patch Details page. Refer to Section 5.2.2, “Patch
Details” (page 104) for more information.
If you misspell a word during your search query, the SUSE Manager search engine per-
forms approximate string (or fuzzy string) matching, returning results that may be simi-
lar in spelling to your misspelled queries.
For example, if you want to search for a certain development system called
test-1.example.com that is registered with SUSE Manager, but you misspell
Navigation 7
your query tset, the test-1.example.com system still appears in the search re-
sults.
NOTE
These systems can be selected in a number of ways. Only systems with at least a Man-
agement entitlement are eligible for selection. On all system and system group lists,
a Select column exists for this purpose. Select the check boxes next to the systems
or groups and click the Update List button below the column. Each time the Systems
Selected tool at the top of the page changes to reflect the new number of systems
ready for use in the System Set Manager. Refer to Section 4.4, “System Set Manager —
[Mgmt]” (page 55) for details.
1.6 Lists
8 User Guide
The information within most categories is presented in the form of lists. These lists
have some common features for navigation. For instance, you can navigate through vir-
tually all lists by clicking the back and next arrows above and below the right side of
the table. Some lists also offer the option to retrieve items alphabetically by clicking
letters above the table.
Navigation 9
SUSE Customer Center
(SCC) and Organization
Credentials (Mirroring
Credentials)
2
SUSE Customer Center (SCC) is the place to manage your SUSE subscriptions, ac-
cess software updates and get in contact with SUSE Customer Support. The registra-
tion flow allows you to get access to your patches and updates.
To migrate your SUSE Manager server to SCC perform an update as usual (see
Section “Updating SUSE Manager” (Chapter 7, Maintenance, ↑Installation & Trou-
bleshooting Guide)) and enable SCC before refreshing your customer center data:
2 Apply the SUSE Manager update using either zypper or YaST Online Update.
12 User Guide
NOTE: Disable Obsolete Cron Jobs
After switching to SCC, disable or delete obsolete cron jobs that you
might have enabled for mgr-ncc-sync (see Section “Automating
Synchronization” (Chapter 7, Maintenance, ↑Installation & Troubleshoot-
ing Guide)) or mgr-inter-sync.
You can perform the migration to SCC with the Web interface as well. The Web inter-
face will detect when the migration is possible after an update of the SUSE Manager
server, and display such a note:
Click Migrate in the text of the note to open the SUSE Customer Center dialog of the
Admin tab.
Then click Start Migration to SUSE Customer Center to perform the actual migration to
SCC.
14 User Guide
Overview
3
Entering the SUSE Manager URL in a browser takes you to the Sign in screen. If you
click on the About tab before logging in, you will find documentation links, including
a search function, and the option to request your login credentials if you forgot either
password or login. Click on Lookup Login/Password.
NOTE
If you forgot your password, enter your SUSE Manager Login and Email Ad-
dress in the Password Reset section and click the Send Password button.
Your password will be reset and sent to you. If you cannot remember your
username, enter your Email Address in the Login Information section, then
click on Send Login. Your username will be sent to you.
After logging into the Web interface of SUSE Manager, the first page to appear is
Overview. This page contains important information about your systems, including
summaries of system status, actions, and patch alerts.
NOTE
If you are new to the SUSE Manager Web interface, read Chapter 1,
Navigation (page 1) to familiarize yourself with the layout and symbols used
throughout the interface.
Overview 15
Figure 3.1: Overview
This page is split into functional areas, with the most critical areas displayed
first. Users can control which of the following areas are displayed by making se-
lections on the Overview > Your Preferences page. Refer to Section 3.2, “Your
Preferences” (page 19) for more information.
• The Tasks area lists the most common tasks an administrator performs via the web.
Click any link to reach the page within SUSE Manager that allows you to accomplish
that task.
• If any systems have not been checking in to SUSE Manager, they are listed under In-
active System to the right. Highlighting them in this way allows an administrator to
quickly select those systems for troubleshooting.
16 User Guide
• Critical Probes[Mon] — Customers with monitoring enabled on their SUSE Manager
can also choose to include a list of all probes in the Critical state.
• Warning Probes [Mon] — Customers with monitoring enabled on their SUSE Man-
ager can also choose to include a list of all probes in the Warning state.
• The Most Critical Systems section lists the most critical systems within your organiza-
tion. It provides a link to quickly view those systems and displays a summary of the
patch updates that have yet to be applied to those systems. Click the name of the sys-
tem to see its System Details page and apply the patch updates. Below the list is a link
to View All Critical Systems on one page.
• The Recently Scheduled Actions section lists all actions less than thirty days old and
their status: failed, completed, or pending. Click the label of any given action to view
its details page. Below the list is a link to View All Scheduled Actions on one page,
which lists all actions that have not yet been carried out on your client systems.
• The Relevant Security Patches section lists all available security patches that have yet
to be applied to some or all of your client systems. It is critical that you apply these
security patches to keep your systems secure. Below this list find links to all patches
(View All Patches) and to the patches that apply to your systems (View All Relevant
Patches).
• The System Group Names section lists groups you may have created and indicates
whether the systems in those groups are fully updated. Click the link below this sec-
tion to get to the System Groups page, where you can choose System Groups to use
with the System Set Manager.
• The Recently Registered Systems section lists the systems added to the SUSE Manag-
er in the past 30 days. Click a system's name to see its System Details page. Click the
link below this section to View All Recently Registered Systems on one page.
Overview 17
If you change your SUSE Manager password, for security reasons you will not see the
new password while you enter it. Replace the asterisks in the Password and Confirm
Password text fields with the new password.
NOTE
Should you forget your password or username, go to the login screen and
click the About tab, then select the Lookup Login/Password page. Here you
can either specify your login and email address or only your email address if
you are not sure about the username. Then click on Send Password or Send
Login respectively.
3.1.1 Addresses
On the Addresses page manage your mailing, billing and shipping addresses, and the
associated phone numbers. Click Edit this address below the address to be modified,
make the changes, and click Update.
To change your preferred email address, click Change Email in the left navigation bar.
Enter your new email address and click the Update button. A confirmation email is
sent to the new email address; responding to the confirmation email validates the new
email address. Invalid email addresses like those ending in @localhost are filtered
and rejected.
• Email Notifications — Determine whether you want to receive email every time a
patch alert is applicable to one or more systems in your account.
IMPORTANT
• SUSE Manager List Page Size — Maximum number of items that appear in a list on
a single page. If more items are in the list, clicking the Next button displays the next
group of items. This preference applies to system lists, patch lists, package lists, and
so on.
• "Overview" Start Page — Select the information areas that are displayed on the
Overview Start Page. Check the box to the left of the information area you would
like to include.
• CSV Files — Select the separator character to be used in downloadable CSV files.
Comma is the default; as an alternative use Semicolon, which is more compatible
with Microsoft Excel.
Overview 19
After making changes to any of these options, click the Save Preferences button.
You can filter the list of trusts by keyword using the Filter by Organization text box and
clicking Go.
20 User Guide
Systems
4
If you click the Systems tab on the top navigation bar, the Systems category and links
appear. Here you can select systems to perform actions on them and create system pro-
files.
Clicking View System Groups at the top of the Overview page takes you to a simi-
lar summary of your system groups. It identifies group status and displays the num-
ber of systems contained. Clicking on the number of systems takes you to the Systems
tab of the System Group Details page, while clicking on the system name takes you
to the Details tab for that system. Refer to Section 4.3.3, “System Group Details —
[Mgmt]” (page 54) for more information.
You can also click on Use in SSM in the System Groups section to go directly to the Sys-
tem Set Manager. Refer to Section 4.4, “System Set Manager — [Mgmt]” (page 55)
for more information.
4.2 Systems
Systems 21
The Systems page displays a list of all your registered systems. Several columns provide
information for each system:
• Select: Unentitled systems cannot be selected. To select systems, mark the appropri-
ate check boxes. Selected systems are added to the System Set Manager, where ac-
tions can be carried out simultaneously on all systems in the set. Refer to Section 4.4,
“System Set Manager — [Mgmt]” (page 55) for details.
• System: The name of the system specified during registration. The default name is
the hostname of the system. Clicking on the name of a system displays its System
Details page. Refer to Section 4.2.14, “System Details” (page 27) for more infor-
mation.
• Updates: Shows which type of update action is applicable to the system or confirms
that the system is up-to-date. Some icons are linked to related tasks. For instance,
the standard Updates icon is linked to the Upgrade subtab of the packages list, while
the Critical Updates icon links directly to the Update Confirmation page. The Not
Checking In icon is linked to instructions for resolving the issue.
— System is up-to-date.
22 User Guide
•
• Packages: Total number of package updates for the system, including packages re-
lated to patch alerts as well as newer versions of packages not related to patch alerts.
For example, if a client system that has an earlier version of a package installed gets
subscribed to the appropriate base channel of SUSE Manager (such as SUSE Linux
Enterprise 11 SP3), that channel may have an updated version of the package. If so,
the package appears in the list of available package updates.
IMPORTANT
If SUSE Manager identifies package updates for the system, but the pack-
age updater (such as Red Hat Update Agent or YaST) responds with a
message like "Your system is fully updated", a conflict likely exists in the
system's package profile or in the up2date configuration file. To resolve
the conflict, either schedule a package list update or remove the pack-
ages from the package exceptions list. Refer to Section 4.2.14, “System
Details” (page 27) for instructions.
• Base Channel: The primary channel for the system based on its operating system.
Refer to Section 6.1, “Software Channels” (page 111) for more information.
• Entitlement: Shows whether or not the system is entitled and at what service level.
Links in the left navigation bar below Systems enable you to select and view predefined
sets of your systems. All of the options described above can be applied within these
pages.
Systems 23
4.2.1 All
The All page contains the default set of your systems. It displays every system you have
permission to manage. You have permission if you are the only user in your organiza-
tion, if you are a SUSE Manager Administrator, or if the system belongs to a group for
which you have admin rights.
System
This column displays the name of each guest system.
Updates
This column shows whether there are patches (errata updates) available for the
guest systems that have not yet been applied.
Status
This column indicates whether a guest is running, paused, or stopped.
Base Channel
This column displays the base channel to which the guest is currently subscribed.
Only guests registered with SUSE Manager are displayed with blue text. Clicking on
the hostname of such a guest system displays its System Details page.
24 User Guide
4.2.4 Out of Date
The Out of Date page displays all systems where applicable patch alerts have not been
applied.
4.2.8 Ungrouped
The Ungrouped page displays systems not yet assigned to a specific system group.
4.2.9 Inactive
The Inactive page displays systems that have not checked in with SUSE Manager for
24 hours or more. Checking in means that the Red Hat Update Agent on Red Hat En-
terprise Linux or the YaST Online Update on SUSE Linux Enterprise client systems
connects to SUSE Manager to see if there are any updates available or if any actions
have been scheduled. If you see a message telling you that check-ins are not taking
place, the client system is not successfully connecting to SUSE Manager. The reason
may be one of the following:
• The system is not entitled to any SUSE Manager service. System profiles that remain
unentitled for 180 days (6 months) are removed.
Systems 25
• The system is entitled, but the SUSE Manager daemon (rhnsd) has been disabled
on the system. Refer to Chapter 3, SUSE Manager Daemon (↑Reference Guide) for
instructions on restarting and troubleshooting.
• The system is behind a firewall that does not allow connections over https
(port 443).
• The system is behind an HTTP proxy server that has not been properly configured.
• The system is connected to a SUSE Manager Proxy Server or SUSE Manager that
has not been properly configured.
• The system itself has not been properly configured, perhaps pointing at the wrong
SUSE Manager Server.
• Some other barrier exists between the system and the SUSE Manager Server.
4.2.11 Proxy
The Proxy page displays the SUSE Manager Proxy Server systems registered with your
SUSE Manager server.
26 User Guide
You can filter duplicate entitlements by IP Address, Hostname, or MAC address by
clicking on the respective subtab. You may filter further by inactive time or typing the
system's hostname, IP address, or MAC address in the corresponding Filter by: text
box.
To compare up to three duplicate entitlements at one time, click the Compare Systems
link in the Last Checked In column. Inactive components of the systems are highlighted
in yellow. You can then determine which systems are inactive or duplicate and delete
them by clicking the Delete System Profile button. Click the Confirm Deletion button to
confirm your choice.
NOTE
The delete system link in the upper right of this screen refers to the system
profile only. Deleting a host system profile will not destroy or remove the reg-
istration of guest systems. Deleting a guest system profile does not remove it
from the list of guests for its host, nor does it stop or pause the guest. It does,
however, remove your ability to manage it via SUSE Manager.
If you mistakenly deleted a system profile from SUSE Manager, you may re-
register the system using the bootstrap script (see Chapter 5, Using Boot-
strap (↑Client Configuration Guide)) or rhnreg_ks manually.
Systems 27
The Details page has numerous subtabs that provide specific system information as
well as other identifiers unique to the system. The following sections discuss these tabs
and their subtabs in detail.
This system summary page displays the system status message and the following key
information about the system:
System Status
This message indicates the current state of your system in relation to SUSE Man-
ager.
NOTE
If updates are available for any entitled system, the message Software
Updates Available appears, displaying the number of critical and non-
critical updates as well as the sum of affected packages. To apply these
updates, click on Packages and select some or all packages to update,
then click Upgrade Packages.
System Info
Hostname
The hostname as defined by the client system.
IP Address
The IP address of the client.
IPv6 Address
The IPv6 address of the client.
28 User Guide
Virtualization
If the client is a virtual machine, the type of virtualization is listed.
UUID
Displays the universally unique identifier.
Kernel
The kernel installed and operating on the client system.
NOTE
Activation Key
Displays the activation key used to register the system.
Installed Products
Lists the products installed on the system.
Lock Status
Indicates whether a system has been locked.
Actions cannot be scheduled for locked systems on the Web interface until the lock
is removed manually. This does not include preventing automated patch updates
scheduled via the Web interface. To prevent the application of automated patch
updates, deselect Auto Patch Update from the System Details > Details > Proper-
ties subtab. For more information, refer to Section “System Details > Details >
Properties” (page 32).
Locking a system can prevent you from accidentally changing a system. For exam-
ple, the system may be a production system that should not receive updates or new
packages until you decide to unlock it.
Systems 29
IMPORTANT
Locking a system in the Web interface will not prevent any actions that
originate from the client system. For example, if a user logs into the client
directly and runs YaST Online Update (on SLE) or pup (on RHEL), the
update tool will install available patches whether or not the system is
locked in the Web interface.
Locking a system does not restrict the number of users who can access
the system via the Web interface. If you wish to restrict access to the
system, associate that system with a System Group and assign a Sys-
tem Group Administrator to it. Refer to Section 4.3, “System Groups —
[Mgmt]” (page 52) for more information about System Groups.
It is also possible to lock multiple systems via the System Set Manager. Re-
fer to Section 4.4.11.6, “System Set Manager > Misc > Lock/Unlock —
[Mgmt]” (page 65) for instructions.
Subscribed Channels
List of subscribed channels. Clicking on a channel name takes you to the Basic
Channel Details page. To change subscriptions, click the (Alter Channel Subscrip-
tions) link right beside the title to assign available base and child channels to this
system. When finished making selections, click the Change Subscriptions button to
change subscriptions and the base software channel. For more information, refer to
Section “System Details > Software > Software Channels ” (page 39).
Base Channel
The first line indicates the base channel to which this system is subscribed. The
base channel should match the operating system of the client.
Child Channels
The subsequent lines of text, which depend on the base channel, list child channels.
An example is the SUSE Manager Tools channel.
System Events
Checked In
The date and time at which the system last checked in with SUSE Manager.
30 User Guide
Registered
The date and time at which the system registered with SUSE Manager and created
this profile.
Last Booted
The date and time at which the system was last started or restarted.
NOTE
2. Provide the earliest date and time at which the reboot may take place.
When the client checks in after the scheduled start time, SUSE Manager
will instruct the system to restart itself.
[Prov] — OSA status is also displayed for client systems registered with SUSE Manag-
er that have a Provisioning entitlement and have enabled OSA. For more information
about OSA, refer to Section “Enabling Push to Clients” (Chapter 7, Maintenance, ↑In-
stallation & Troubleshooting Guide).
System Properties
Entitlements
Lists entitlements currently applied to the system.
Systems 31
Notifications
Indicates the notification options for this system. You can choose whether you
wish to receive email notifying you of available updates for this system. In addi-
tion, you may choose to include Management-entitled systems in the daily summa-
ry email.
Contact Method
Available methods: Pull, Push via SSH, and Push via SSH tunnel.
System Name
By default, the hostname of the client is displayed, but a different system name can
be assigned.
Description
This information is automatically generated at registration. You can edit the de-
scription to include any information you wish.
Location
This field displays the physical address of the system if specified.
Clicking the Edit These Properties link right beside the System Properties title opens the
System Details > Properties subtab. On this page, edit any text you choose, then click
the Update Properties button to confirm.
System Name
By default, this is the hostname of the system. You can however alter the profile
name to anything that allows you to distinguish this system from others.
Base Entitlement
Select one of the available base entitlements.
Add-on entitlements
If available, apply a Monitoring, Provisioning or Virtualization Platform entitle-
ment to the system.
32 User Guide
Notifications
Select whether notifications about this system should be sent and whether to in-
clude this system in the daily summary. (By default, all Management and Provi-
sioning systems are included in the summary.) This setting keeps you aware of all
advisories pertaining to the system. Anytime an update is released for the system,
you receive an email notification.
The daily summary reports system events that affect packages, such as scheduled
patch updates, system reboots, or failures to check in. In addition to including the
system here, you must choose to receive email notification in the Your Preferences
page of the Overview category.
Contact Method
Select between Pull, Push via SSH, and Push via SSH tunnel.
Description
By default, this text box records the operating system, release, and architecture
of the system when it first registers. Edit this information to include anything you
like.
The remaining fields record the physical address at which the system is stored. To con-
firm any changes to these fields, click the Update Properties button.
Many of these properties can be set for multiple systems in one go via the
System Set Manager interface. Refer to Section 4.4, “System Set Manager
— [Mgmt]” (page 55) for details.
Systems 33
System Details > Details > Remote Command — [Prov]
This subtab allows you to run a remote command on the system if the system has a
Provisioning entitlement. Before doing so, you must first configure the system to ac-
cept such commands.
1 On SLE clients, subscribe the system to the SUSE Manager Tools child channel and
use zypper to install the rhncfg, rhncfg-client, and rhncfg-actions
packages, if not already installed:
zypper in rhncfg rhncfg-client rhncfg-actions
On RHEL clients, subscribe the system to the Tools child channel and use
up2date or yum to install the rhncfg, rhncfg-client, and rhncfg-ac-
tions packages, if not already installed:
yum install rhncfg rhncfg-client rhncfg-actions
2 Log into the system as root and add the following file to the local SUSE Manager
configuration directory: allowed-actions/scripts/run.
2b Create an empty run file in that directory to act as a flag to SUSE Manager,
signaling permission to allow remote commands:
touch /etc/sysconfig/rhn/allowed-actions/script/run
Once the setup is complete, refresh the page in order to view the text fields for remote
commands. Identify a specific user, group, and timeout period, as well as the script to
run. Select a date and time to execute the command, then click Schedule Remote Com-
mand or add the remote command to an action chain. For further information on action
chains, refer to Section 10.5, “Action Chains” (page 153).
34 User Guide
with a specific system ID, keys created here do not show up within the Activation Keys
page.
Reactivation keys can be combined with activation keys to aggregate the settings of
multiple keys for a single system profile. For example:
rhnreg_ks --server=server-url \
--activationkey=reactivation-key,activationkey --force
WARNING
When autoinstalling a system with its existing SUSE Manager profile, the pro-
file uses the system-specific activation key created here to re-register the
system and return its other SUSE Manager settings. For this reason, you
should not regenerate, delete, or use this key (with rhnreg_ks) while a pro-
file-based autoinstallation is in progress. If you do, the autoinstallation will fail.
Systems 35
This subtab, available for systems with a Provisioning entitlement, provides complete-
ly customizable information about the system. Unlike Notes, Custom Info is struc-
tured, formalized, and can be searched. Before you can provide custom informa-
tion about a system, you must have Custom Information Keys. Click on Custom Sys-
tem Info in the left navigation bar. Refer to Section 4.8, “Custom System Info —
[Prov]” (page 74) for instructions.
Once you have created one or more keys, you may assign values for this system by se-
lecting the create new value link. Click the name of the key in the resulting list and en-
ter a value for it in the Description field, then click the Update Key button.
A Status column in the patches table shows whether an update has been scheduled. Pos-
sible values are: None, Pending, Picked Up, Completed, and Failed. This column dis-
plays only the latest action related to a patch. For instance, if an action fails and you
reschedule it, this column shows the status of the patch as Pending with no mention
of the previous failure. Clicking a status other than None takes you to the Action De-
tails page. This column corresponds to the one on the Affected Systems tab of the Patch
Details page.
36 User Guide
System Details > Software > Packages
Manage the software packages on the system. Most of the following actions can also
be performed via action chains. For further information on action chains, refer to Sec-
tion 10.5, “Action Chains” (page 153).
WARNING
When new packages or updates are installed on the client via SUSE Man-
ager, any licenses (EULAs) requiring agreement before installation are auto-
matically accepted.
Packages
The default display of the Packages tab describes the options available and pro-
vides the means to update your package list. To update or complete a potentially
outdated list, possibly due to the manual installation of packages, click the Update
Package List button in the bottom right-hand corner of this page. The next time
the SUSE Manager Daemon (rhnsd) connects to SUSE Manager, it updates your
system profile with the latest list of installed packages.
List/Remove
Lists installed packages and enables you to remove them. View and sort packages
by name, architecture, and the date they were installed on the system. Search for
the desired packages by typing its name in the Filter by Package Name text box, or
by clicking the letter or number corresponding to the first character of the package
name. Click on a package name to view its Package Details page. To delete pack-
ages from the system, select their check boxes and click the Remove Packages but-
ton on the bottom right-hand corner of the page. A confirmation page appears with
the packages listed. Click the Confirm button to remove the packages.
Upgrade
Displays a list of packages with newer versions available in the subscribed chan-
nels. Click on the latest package name to view its Package Details page. To up-
grade packages immediately, select them and click the Upgrade Packages button.
Any EULAs will be accepted automatically. To download the packages as a .tar
file, select them and click the Download Packages button.
Install
Install new packages on the system from the available channels. Click on the pack-
age name to view its Package Details page. To install packages, select them and
click the Install Selected Packages button. EULAs are automatically accepted.
Systems 37
Verify
Validates the packages installed on the system against its RPM database. This is
the equivalent of running rpm -V. The metadata of the system's packages are
compared with information from the database, such as file checksum, file size,
permissions, owner, group and type. To verify a package or packages, select them,
click the Verify Selected Packages button, and confirm. When the check is finished,
select this action in the History subtab under Events to see the results.
Lock
Locking a package prevents modifications like removal or update of the package.
Since locking and unlocking happens via scheduling requests, locking might take
effect with some delay. If an update happens before then, the lock will have no ef-
fect. Select the packages you want to lock. If locking should happen later, select
the date and time above the Request Lock button, then click on it. A small lock
icon marks locked packages. To unlock, select the package and click Request Un-
lock, optionally specifying the date and time for unlocking to take effect.
NOTE
Profiles
Compare installed packages with the package lists in stored profiles and other
Management and Provisioning systems. Select a stored profile from the drop-down
menu and click the Compare button. To compare with packages installed on a dif-
ferent system, select the system from the associated drop-down menu and click the
Compare button. To create a stored profile based on the existing system, click the
Create System Profile button, enter any additional information you desire, and click
the Create Profile button. These profiles are kept within the Stored Profiles page
linked from the left navigation bar.
[Prov] — Once installed packages have been compared with a profile, Provision-
ing customers have the option to synchronize the selected system with the profile.
Note that all changes apply to the system not the profile. Packages might get delet-
ed and additional packages installed on the system. To install only specific pack-
ages, click the respective check boxes in the profile. To remove specific packages
installed on the system, select the check boxes of these packages showing a differ-
ence of This system only. To completely synchronize the system's packages with
38 User Guide
the compared profile, select the master check box at the top of the column. Then
click the Sync Packages to button. On the confirmation screen, review the changes,
select a time frame for the action, and click the Schedule Sync button.
WARNING
SUSE only supports one step at a time, this means it is not be possible to migrate from
e.g., SP1 to SP3. Supported migration paths include:
The migration feature does not cover any rollback functionality. Once the mi-
gration procedure is started, rolling back is not possible. Therefore it is rec-
ommended to have a working system backup available for an emergency.
Systems 39
For more information, see Chapter 6, Service Pack Migration (↑Client Configuration
Guide) and Section “Migrating SUSE Manager Proxy 1.7 to SUSE Manager Proxy
2.1” (↑Proxy Quick Start).
The following procedure shows how to view software reports for a single Red Hat
client system with ABRT tools installed.
1 On the Systems page, select the Red Hat system, click on its name, then Software >
Software Crashes to see the list of software failures that occurred on the registered
system.
2 Click the required failure to see its details and the files captured for this software
failure report.
Software failures can be grouped across all Red Hat systems by Crash UUID. This
helps with identifying similar software crashes.
1 Click the Systems tab, then select Software Crashes from the left navigation bar.
2 Click the on a Crash UUID to see the systems affected by the software failure.
3 Click on a specific system to see details and the files captured for the individual
software failure report.
40 User Guide
With every software failure, clients upload the files captured by ABRT during the fail-
ure to your SUSE Manager. Because these files may be of arbitrary length, you can
configure an organization-wide size limit for the upload of a single crash file.
1 On the Admin page, click on the organization name, then select Configuration.
2 Modify the desired upload size settings, then click Update Organization to save.
The organization-wide settings for individual crash files are now changed to the chosen
values.
NOTE
This section is available to normal users with access to systems that have configura-
tion management enabled. Like software channels, configuration channels store files to
be installed on systems. While software updates are provided by NCC, configuration
files are managed solely by you. Also unlike with software packages, various versions
of configuration files may prove useful to a system at any given time. Only the latest
version can be deployed.
Systems 41
on the blue links to add files, directories or symlinks. Here you also find shortcuts to
perform any of the common configuration management tasks listed on the right of the
screen by clicking one of the links under Configuration Actions.
Centrally-Managed Files
Centrally-managed configuration files are provided by global configuration chan-
nels. Determine which channel provides which file by examining the Provided By
column below. Some of these centrally-managed files may be overridden by local-
ly-managed files. Check the "Overridden By" column to find out if any files are
overridden.
Locally-Managed Files
Locally-managed configuration files are useful for overriding centrally-managed
configuration profiles that cause problems on particular systems. Also, local-
ly-managed configuration files are a method by which system group administrators
who don't have configuration administration privileges can manage configuration
files on the machines they are able to manage.
Local Sandbox
In the sandbox you can store configuration files under development. You can pro-
mote files from the sandbox to a centrally-managed configuration channel using
Copy Latest to Central Channel. After files in this sandbox have been promoted to
a centrally-managed configuration channel, you will be able to deploy them to oth-
er systems.
Upload File
To upload a configuration file from your local machine, browse for the upload file,
specify whether it is a text or binary file, enter Filename/Path as well as user and
group ownership. Specific file permissions can be set. When done, click Upload
Configuration File.
42 User Guide
Import Files
Via the Import Files tab, you can add files from the system you have selected be-
fore and add it to the sandbox of this system. Files will be imported the next time
rhn_check runs on the system. To deploy these files or override configuration
files in global channels, copy this file into your local override channel after the im-
port has occurred.
In the text field under Import New Files enter the full path of any files you want
import into SUSE Manager or select deployable configuration files from the Im-
port Existing Files list. When done, click Import Configuration Files.
Create File
Under Create File, you can directly create the config file from scratch. Select the
file type, specify the path and filename, where to store the file, plus the symbol-
ic link target filename and path. Ownership and permissions as well as macro de-
limiters need to be set. For more information on using macros, see Section 9.4.3,
“Including Macros in your Configuration Files” (page 147). In the File Con-
tents text field, type the configuration file. Select the type of file you are creating
from the drop-down menu. Possible choices are Bash, Perl, Php, Python, Ruby and
XML. When done, click Create Configuration File
NOTE
If you click on the Filename of a (system override) file, you can edit its con-
tents.
The Overrides column identifies the configuration file in an unsubscribed channel that
would replace the same file in a currently subscribed channel. For example, if a system
has /etc/foo from channel bar and /etc/foo from channel baz is in the Over-
rides column, then unsubscribing from channel bar will mean that the file from chan-
nel baz will be applicable. If no file is listed in the Overrides column for a given file
Systems 43
path, then unsubscribing from the channel providing the file will mean that the file is
no longer managed (though it will not be removed from the system).
The List/Unsubscribe from Channels subtab contains a list of the system's configuration
channel subscriptions. Click the check box next to the Channel and click Unsubscribe
to remove the subscription to the channel.
The Subscribe to Channels subtab lists all available configuration channels. To subscribe
to a channel, select the check box next to it and press Continue. To subscribe to all con-
figuration channels, click Select All and press Continue. The View/Modify Rankings
page automatically loads.
The View/Modify Rankings subtab allows users to set the priority with which files from
a particular configuration channel are ranked. The higher the channel is on the list, the
more its files take precedence over files on lower-ranked channels. For example, the
higher-ranked channel may have an httpd.conf file that will take precedence over
the same file in a lower-ranked channel.
44 User Guide
If a file exists, click its name to go to the Configuration File Details page. Refer to Sec-
tion 9.4, “Configuration Files” (page 146) for instructions. To replicate the file with-
in a config channel, select its check box, click the Copy to Config Channel button, and
select the destination channel. To remove a file, select it and click Delete Selected Files.
In the Schedule subtab, schedule the selected system for autoinstallation. Choose from
the list of available profiles.
NOTE
You must first create a profile before it appears on this subtab. If you have
not created any profiles, refer to Section 4.9.4, “Create a New Kickstart
Profile” (page 86) before scheduling an autoinstallation for a system.
Select a time for the autoinstallation to begin and click Schedule Autoinstall and Finish
for all changes to take effect and to schedule the autoinstallation.
Systems 45
Alternatively, click Create PXE Installation Configuration to create a Cobbler system
record. The selected autoinstallation profile will be used to automatically install the
configured distribution next time that particular system boots from PXE. In this case
SUSE Manager and its network must be properly configured to allow PXE booting.
NOTE
The Variables subtab can be used to create Kickstart variables, which substitute values
in Kickstart files. To define a variable, create a name-value pair (name/value) in
the text box.
For example, if you want to Kickstart a system that joins the network of a specific or-
ganization (for instance the Engineering department) you can create a profile variable
to set the IP address and the gateway server address to a variable that any system using
that profile will use. Add the following line to the Variables text box:
IPADDR=192.168.0.28
GATEWAY=192.168.0.1
To use the system variable, use the name of the variable in the profile instead of the
value. For example, the network portion of a Kickstart file could look like the fol-
lowing:
network --bootproto=static --device=eth0 --onboot=on --ip=$IPADDR \
--gateway=$GATEWAY
NOTE
There is a hierarchy when creating and using variables in Kickstart files. Sys-
tem Kickstart variables take precedence over profile variables, which in turn
take precedence over distribution variables. Understanding this hierarchy
can alleviate confusion when using variables in Kickstarts.
Using variables are just one part of the larger Cobbler infrastructure for creating tem-
plates that can be shared between multiple profiles and systems. For more informa-
tion about Cobbler and Kickstart templates, refer to Chapter 7, Cobbler (↑Reference
Guide).
46 User Guide
System Details > Provisioning > Power Management —
[Prov]
SUSE Manager allows you to power on, off, and reboot systems (either physical or
bare-metal) via the IPMI protocol if the systems are IPMI-enabled. You need a fully
patched SUSE Manager 2.1 installation. To use any power management functionality,
IPMI configuration details must be added to SUSE Manager. First select the target sys-
tem on the systems list, then selectProvisioning > Power Management. On the displayed
configuration page, edit all required fields (marked with a red asterisk) and click Save.
Systems can be powered on, off, or rebooted from the configuration page via corre-
sponding buttons. Note that any configuration change is also saved in the process. The
Save and Get Status button can also be used to query for the system's power state. If
configuration details are correct, a row is displayed with the current power status ("on"
or "off"). If a power management operation succeeds on a system, it will also be noted
in its Event History tab.
Power management functionalities can also be used from the system set manager to op-
erate on multiple systems at the same time. Specifically, you can change power man-
agement configuration parameters or apply operations (power on, off, reboot) to multi-
ple systems at once. In order to do that, add respective systems to the system set man-
ager as described in Section 4.4, “System Set Manager — [Mgmt]” (page 55).
Then click on Manage > Provisioning > Power Management Configuration to change
one or more configuration parameters for all systems in the set. Note that any field left
blank will not alter the configuration parameter in selected systems.
Once all configuration parameters are set correctly, click on Manage > Provisioning >
Power Management Operations to power on, off or reboot systems from the set. Note
that the Provisioning entitlement is required for non-bare metal systems.
To check that a power operation was executed correctly, click on System Set Manager >
Status on the left-hand menu, then click on the proper line in the list. This will display
a new list with systems to which the operation was applied. In the event of errors which
prevent correct execution, a brief message with an explanation will be displayed in the
Note column.
This feature uses Cobbler power management, thus a Cobbler system record is auto-
matically created at first use if it does not exist already. In that case, the automatically
created system record will not be bootable from the network and will reference a dum-
Systems 47
my image. This is needed because Cobbler does not currently support system records
without profiles or images. The current implementation of Cobbler power manage-
ment uses the fence-agent tools to support multiple protocols besides IPMI. Those are
not supported by SUSE Manager but can be used by adding the fence agent names as
a comma-separated list to the java.power_management.types configuration
parameter.
Snapshots enable you to roll back the system's package profile, configuration files, and
SUSE Manager settings. Snapshots are always captured automatically whenever an ac-
tion takes place on a Provisioning-entitled system. The Snapshots subtab lists all snap-
shots for the system, including the reason why the snapshot was taken, the time it was
taken, and the number of tags applied to each snapshot.
To revert to a previous configuration, click the Reason for the snapshot and review the
potential changes on the provided subtabs, starting with Rollback.
Snapshot roll backs support the ability to revert certain changes to the sys-
tem, but not in every scenario. For example, you can roll back a set of RPM
packages, but rolling back across multiple update levels is not supported.
Each subtab provides the specific changes that will be made to the system during the
rollback:
• group memberships,
• channel subscriptions,
48 User Guide
• installed packages,
• configuration files,
• snapshot tags.
When satisfied with the reversion, return to the Rollback subtab and click the Rollback
to Snapshot button. To see the list again, click Return to snapshot list.
• There is no maximum number of snapshots that SUSE Manager will keep, thus re-
lated database tables will grow with system count, package count, channel count, and
the number of configuration changes over time. Installations with more than a thou-
sand systems should consider setting up a recurring cleanup script via the API or dis-
abling this feature altogether.
Snapshot tags provide a means to add meaningful descriptions to your most recent sys-
tem snapshot. This can be used to indicate milestones, such as a known working con-
figuration or a successful upgrade. To tag the most recent snapshot, click create new
system tag, enter a descriptive term in the Tag name field, and click the Tag Current
Snapshot button. You may then revert using this tag directly by clicking its name in
the Snapshot Tags list. To delete tags, select their check boxes, click Remove Tags, and
confirm the action.
Systems 49
To add a probe to the system, click the create new probe link at the top-right corner and
fill in the fields on the following page. Refer to Section “Managing Probes” (Chapter 4,
Monitoring, ↑Reference Guide) for detailed instructions.
Once the probe has been added, you must reconfigure your Monitoring infrastructure
to recognize it. Refer to Section 12.2, “Scout Config Push — [Mon]” (page 169) for
details. After the probe has run, its results become available on the Current State page.
Refer to Section 12.1.7, “Current State — [Mon]” (page 168) for details.
To remove a probe from a system, click on the name of the probe, then click the delete
probe link in the upper right corner. Confirm by clicking the Delete Probe button to
complete the process.
This subtab lists groups to which the system belongs and enables you to cancel mem-
bership. Only System Group Administrators and SUSE Manager Administrators can
remove systems from groups. Non-admins just see a Review this system's group mem-
bership page. To remove the system from one or more groups, select the respective
check boxes of these groups and click the Leave Selected Groups button. To see the
System Group Detailspage, click on the group's name. Refer to Section 4.3.3, “System
Group Details — [Mgmt]” (page 54) for more information.
Lists groups that the system can be subscribed to. Only System Group Administra-
tors and SUSE Manager Administrators can add a system to groups. Non-admins see
a Review this system's group membership page. To add the system to groups, select the
groups' check boxes and click the Join Selected Groups button.
50 User Guide
4.2.14.8 System Details > Events
Displays past, current, and scheduled actions on the system. You may cancel pending
events here. The following sections describe the Events subtabs and the features they
offer.
Actions can be chained so that action 'a' requires action 'b' which requires action 'c'.
Action 'c' is performed first and has a check box next to it until it is completed success-
fully. If any action in the chain fails, the remaining actions also fail. To unschedule a
pending event, select the event and click the Cancel Events button at the bottom of the
page. The following icons indicate the type of events:
— Package Event,
— Patch Event,
— Preferences Event,
— System Event.
Systems 51
4.3 System Groups — [Mgmt]
The System Groups page allows all SUSE Manager Management and Provisioning users
to view the System Groups list. Only System Group Administrators and SUSE Manager
Administrators may perform the following additional tasks:
2. Add systems to system groups. (Refer to Section 4.3.2, “Adding and Removing Sys-
tems in Groups” (page 53).)
The System Groups list displays all system groups. The list contains several columns for
each group:
• Select — Via the check boxes add all systems in the selected groups to the System
Set Manager by clicking the Update button. All systems in the selected groups are
added to the System Set Manager. You can then use the System Set Manager to per-
form actions on them simultaneously. It is possible to select only those systems that
are members of all of the selected groups, excluding those systems that belong on-
ly to one or some of the selected groups. To do so, select the relevant groups and
click the Work with Intersection button. To add all systems of all selected groups,
click the Work with Union button. Each system will show up once, regardless of the
number of groups to which it belongs. Refer to Section 4.4, “System Set Manager —
[Mgmt]” (page 55) for details.
• Updates — Shows which type of patch alerts are applicable to the group or confirms
that all systems are up-to-date. Clicking on a group's status icon takes you to the
Patch tab of its System Group Details page. Refer to Section 4.3.3, “System Group
Details — [Mgmt]” (page 54) for more information.
52 User Guide
•
• Group Name — The name of the group as configured during its creation. The name
should be explicit enough to distinguish from other groups. Clicking on the name of
a group takes you to the Details tab of its System Group Details page. Refer to Sec-
tion 4.3.3, “System Group Details — [Mgmt]” (page 54) for more information.
• Systems — Total number of systems in the group. Clicking on the number takes
you to the Systems tab of the System Group Details page for the group. Refer to Sec-
tion 4.3.3, “System Group Details — [Mgmt]” (page 54) for more information.
• Use in SSM — Clicking the Use in SSM link in this column loads all and only the sys-
tems in the selected group and launches the System Set Manager immediately. Refer
to Section 4.4, “System Set Manager — [Mgmt]” (page 55) for more informa-
tion.
Systems 53
4.3.3 System Group Details — [Mgmt]
At the top of each System Group Details page are two links: work with group and delete
group. Clicking delete group deletes the System Group and should be used with caution.
Clicking Work with Group loads the group's systems and launches the System Set Man-
ager immediately just like the Use Group button from the System Groups list. Refer to
Section 4.4, “System Set Manager — [Mgmt]” (page 55) for more information.
The System Group Details page is split into the following tabs:
54 User Guide
Details” (page 104) for more information.) Clicking the Affected Systems number
lists all of the systems affected by the patch. To apply the patch updates in this list, se-
lect the systems and click the Apply Patches button.
• Set the subscription and rank of configuration channels for Provisioning-entitled sys-
tems.
Systems 55
• Tag the most recent snapshots of your selected Provisioning-entitled systems.
Before performing actions on multiple systems, select the systems you wish to modify.
To do so, click the List the systems link, check the boxes to the left of the systems you
wish to select, and click the Update List button.
You can access the System Set Manager in three different ways:
1. Click the System Set Manager link in the left navigation area.
3. Check the Work with Group link on the System Group Details page.
56 User Guide
4.4.4 System Set Manager > Packages —
[Mgmt]
Click the number in the Systems column to see the systems in the System Set Manager
to which a package applies. Modify packages on the system via the following subtabs:
Systems 57
for the specified package. If there are any discrepancies, they are displayed in the Sys-
tem Details page for each system.
Select the check box next to all packages to be verified, then click the Verify Pack-
ages button. On the next page, select a date and time for the verification, then click the
Schedule Verifications button.
58 User Guide
pare the configuration files on the systems. The channels are created in the Man-
age Config Channels interface within the Channels category. Refer to Section 9.2,
“Overview” (page 142) for channel creation instructions.
To manage the configuration of a system, install the latest rhncfg* packages. Refer
to Section 9.1, “Preparing Systems for Config Management” (page 141) for instruc-
tions on enabling and disabling scheduled actions for a system.
To subscribe the selected systems to the available configuration files, select the check
box for each desired file. When done, click Deploy Configuration and schedule the ac-
tion. Note that the latest versions of the files, at the time of scheduling, are deployed.
Newer versions created after scheduling are disregarded.
To compare the configuration files deployed on the systems with those in SUSE Man-
ager, select the check box for each file to be validated. Then click Analyze Differences
and schedule the action. The comparisons for each system will not complete until each
system checks in to SUSE Manager. Once each comparison is complete, any differ-
ences between the files will be accessible from each system's events page.
Note that the latest versions of the files, at the time of scheduling, are compared. New-
er versions created after scheduling are disregarded. Find the results in the main Sched-
ule category or within the System Details > Events tab.
Systems 59
4.4.8.3 System Set Manager > Configuration >
Subscribe to Channels — [Prov]
Subscribe systems to configuration channels according to the order of preference. This
tab is available only to SUSE Manager Administrators and Configuration Administra-
tors. Enter a number in the Rank column to subscribe to a channel. Channels are ac-
cessed in the order of their rank, starting with the number 1. Channels not assigned a
numeric value are not associated with the selected systems. Your local configuration
channel always overrides all other channels. Once you have established the rank of the
config channels, you must decide how they are applied to the selected systems.
The three buttons below the channels reflect your options. Clicking Subscribe with
Highest Priority places all the ranked channels before any other channels to which the
selected systems are currently subscribed. Clicking Subscribe With Lowest Priority
places the ranked channels after those channels to which the selected systems are cur-
rently subscribed. Clicking Replace Existing Subscriptions removes any existing associa-
tion and creates new ones with the ranked channels, leaving every system with the same
config channels in the same order.
In the first two cases, if any of the newly ranked config channels are already in a
system's existing config channel list, the duplicate channel is removed and replaced ac-
cording to the new rank, effectively reordering the system's existing channels. When
such conflicts exist, you are presented with a confirmation page to ensure the intended
action is correct. When the change has taken place, a message appears at the top of the
page indicating the update was successful.
60 User Guide
sooner than radio button and using the drop-down menus to configure date and time,
then clicking Enable Configuration Management.
Choose Select autoinstallation profile if you want to apply the same profile to all sys-
tems in the set. This is the default option. You will see a list of available profiles to se-
lect from once you click on Continue.
If you use Autoinstall by IP Address, SUSE Manager will automatically pick a profile
for each system so that the system's IP address will be in one of the IP ranges specified
in the profile itself. If such a profile cannot be found, SUSE Manager will look for an
organization default profile and apply that instead. For more information on assigning
default profiles to organizations, refer to Section 4.9.4.5, “Assigning Default Profiles to
an Organization” (page 90) If no matching IP ranges nor organization default pro-
files can be found, no autoinstallation will be performed on the system. You will be no-
tified on the next page if that happens.
To use Cobbler system records for autoinstallation, select Create PXE Installation Con-
figuration. With PXE boot, you can not only reinstall clients, but automatically install
machines that don't have an operating system installed yet. SUSE Manager and its net-
work must be properly configured to enable PXE booting. For more information on
Cobbler and Kickstart templates, refer to Chapter 7, Cobbler (↑Reference Guide).
Systems 61
NOTE
If a system set contains bare-metal systems and installed clients, only fea-
tures working for systems without an operating system installed will be avail-
able. Full features will be enabled again once all bare-metal systems are re-
moved from the set.
If any of the systems connect to SUSE Manager via a proxy server, choose either the
Preserve Existing Configuration radio button or the Use Proxy radio button. If you
choose to autoinstall through a proxy server, select from the available proxies listed in
the drop-down box beside the Use Proxy radio button. All of the selected systems will
autoinstall via the selected proxy. Click the Schedule Autoinstall button to confirm your
selections. When the autoinstallations for the selected systems are successfully sched-
uled, you will return to the System Set Manager page.
62 User Guide
4.4.10 System Set Manager > Audit —
[Mgmt]
System sets can be scheduled for XCCDF scans. Enter the command and com-
mand-line arguments, as well as the path to the XCCDF document. Then sched-
ule the scan. All target systems are listed below with a flag whether they support
OpenSCAP scans. For more details on OpenSCAP and audits, refer to Chapter 7,
Audit (page 123)
Add or remove add-on entitlements by clicking on System Entitlements Page and set
System Preferences via the respective radio buttons.
Systems 63
to individual systems through the Properties subtab of the System Details page. Refer to
Section “System Details > Details > Properties” (page 32) for instructions.
• Receive Notifications of Updates/Patches — This setting keeps you aware of all ad-
visories pertaining to your systems. Any time an update is released for a system you
administer, a notification is sent via email.
• Include system in Daily Summary — This setting includes the selected systems in a
daily summary of system events. By default, all Management and Provisioning sys-
tems are included in the summary. These system events are actions that affect pack-
ages, such as scheduled patch updates, system reboots, or failures to check in. Select
receive email notifications on the Your Preferences page. Refer to Section 3.2, “Your
Preferences” (page 19) for instructions. Note that SUSE Manager sends these sum-
maries only to verified email addresses.
• Automatic application of relevant Patches — This setting enables the automatic ap-
plication of patch updates to the selected systems. Packages associated with patch-
es are updated without any user intervention. The use of the auto-update feature for
production systems is not recommend because conflicts between packages and envi-
ronments can cause system failures.
64 User Guide
4.4.11.6 System Set Manager > Misc > Lock/
Unlock — [Mgmt]
Select the Lock/Unlock subtab to select systems to be excluded from package updates.
Enter a Lock reason in the text field and click the Lock button. Already locked systems
can be unlocked on this page. Select them and click Unlock.
Refine searches using the Fields to Search drop-down menu, which is set to Name/De-
scription by default.
Systems 65
• Rack — the designated location within a server room where a system is situ-
ated.
• Network Info — Search systems based on specific networking details such as IP ad-
dress.
• Packages — Search by the packages installed (and not yet installed) on the system.
• DMI Info — The Desktop Management Interface (DMI) is a standard for manage-
ment of components on computer system. Search for SUSE Manager systems using
the following DMI retrieval methods:
• BIOS — BIOS support information such as BIOS vendor name and version,
hardware support enabled in the BIOS, and more.
66 User Guide
• Asset Tag — A unique identifier assigned by an IT department (or vendor) to
a system for better tracking, management and inventory.
• CPU MHz Less Than — Search systems with a processor less than the se-
lected speed in Megahertz.
• CPU MHz More Than — Search systems with a processor more than a user-
designated speed in Megahertz.
• Number of CPUs Less Than — Search systems with a sum of processors less
than the user-designated quantity.
• RAM Less Than — Search systems with less memory than the user-designat-
ed quantity in megabytes.
• RAM More Than — Search systems with more memory than the user-desig-
nated quantity in megabytes.
• Activity — Search by the amount of time elapsed since the systems first or last
checked in with SUSE Manager.
• Days Since Last Check-in — Search by the amount of days passed since the
systems last checked in with SUSE Manager.
• Days Since First Check-in — Search by the amount of days passed since the
systems first checked in with SUSE Manager.
Systems 67
• Custom Info — Information which only applies to this one system.
The Activity selections (Days Since Last Check-in, for instance) are useful in finding
and removing outdated system profiles.
Type the keyword, select the criterion to search by, use the radio buttons to specify
whether you wish to query all systems or only those in the System Set Manager, and
click the Search button. To list all systems that do not match the criteria, select the In-
vert Result check box.
The results appear at the bottom of the page. For details on how to use the resulting
system list, refer to Section 4.2, “Systems” (page 21).
NOTE
68 User Guide
Procedure 4.4: Creating Activation Keys
1 Select Systems from the top navigation bar then Activation Keys from the left navi-
gation bar.
2 Click the create new key link at the upper right corner.
4 Key — Either choose automatic generation by leaving this field blank or enter the
key you want to generate in the Key field. This string of characters can then be
used with rhnreg_ks to register client systems with SUSE Manager. Refer to
Section 4.6.2, “Using Multiple Activation Keys at Once — [Prov]” (page 73)
for details.
Do not insert commas in the key. All other characters are allowed. Com-
mas are problematic because they are used as separator when two or
more activation keys are used at once.
5 Usage Limit — The maximum number systems that can be registered with the ac-
tivation key concurrently. Leave blank for unlimited use. Deleting a system pro-
file reduces the usage count by one and registering a system profile with the key
increases the usage count by one.
6 Base Channel — The primary channel for the key. This can be either the SUSE
Manager Default channel or a custom base channel.
Selecting SUSE Manager Default allows client systems to register with the
SUSE-provided default channel that corresponds with their installed version of
SUSE Linux Enterprise. You can also associate the key with a custom base chan-
nel. If a system using this key is not compatible with the selected channel, it will
fall back to the SUSE Manager default channel.
8 Contact Method - Select how clients communicate with SUSE Manager. Pull
waits for the client to check in. With Push via SSH and Push via SSH tunnel the
Systems 69
server contacts the client via SSH (with or without tunnel) and pushes updates
and actions, etc.
9 Universal default — Select whether or not this key should be considered the pri-
mary activation key for your organization.
Only one universal default activation key can be defined per organiza-
tion. If a universal key already exists for this organization, you will unset
the currently used universal key by activating the check box.
After creating the unique key, it appears in the list of activation keys along with the
number of times it has been used (see Figure 4.1, “Activation Keys” (page 70)).
Note that only Activation Key Administrators can see this list. At this point, you can
70 User Guide
configure the key further, for example, associate the key with child channels (e.g., the
Tools child channel), packages (e.g., the rhncfg-actions package) and groups.
Systems registered with the key get automatically subscribed to them.
To change the information about a key, click the key's description in the list to display
its Details page (see Figure 4.2, “Activation Key Details With Subtabs” (page 72)).
Here you can change the settings at key creation and activate Configuration File De-
ployment. Via additional tabs you can select channels, packages, group membership and
view activated systems. Modify the appropriate tab then click the Update Key button.
To disassociate channels and groups from a key, deselect them in the respective menus
by Ctrl-clicking their highlighted names. To remove a key entirely, click the delete key
link in the upper right corner of the Details page.
Systems 71
Figure 4.2: Activation Key Details With Subtabs
72 User Guide
Any (client tools) package installation requires that the Client Tools channel is available
and the Provisioning checkbox is selected. The Client Tools channel should be selected
in the Child Channels tab.
After you created the activation key, you can see in the Details tab a checkbox named
Configuration File Deployment. If you select it, all needed packages are automatical-
ly added to the Packages list. By default, the following packages which are added:
rhncfg, rhncfg-client, and rhncfg-actions.
If you select Virtualization or Virtualization Platform you automatically get the follow-
ing package: rhn-virtualization-host.
Adding the osad packages makes sense if you want to execute scheduled actions im-
mediately after the schedule time.
To disable system activations with a key, uncheck the corresponding box in the Enabled
column in the key list. The key can be re-enabled by selecting the check box. Click
the Update Keys button on the bottom right-hand corner of the page to activate your
changes.
Without this stacking ability, your organization would need at least six activation keys
to manage four server groups and subscribe a server to any two groups. Factor in two
versions of the operating system and you need twice the number of activation keys. A
larger organization would need keys in the dozens.
Systems 73
Registering with multiple activation keys requires some caution; conflicts between
some values cause registration to fail. Conflicts in the following values do not cause
registration to fail, a combination of values is applied: software packages, software
child channels, and config channels. Conflicts in the remaining properties are resolved
in the following manner:
Do not use system-specific activation keys along with other activation keys; registration
fails in this event.
You are now ready to use multiple activation keys at once. Separate keys with a comma
at the command line with rhnreg_ks or in a Kickstart profile in the Activation Keys
tab of the Autoinstallation Details page. Refer to Section 4.9.4.16, “Activation Keys —
[Prov]” (page 93) for instructions.
To edit a profile, click its name in the list, alter its name or description, and click the
Update Profile button. To view software associated with the profile, click the Packages
subtab. To remove the profile entirely, click delete profile at the upper-right corner of
the page.
74 User Guide
Click create new key in the upper-right corner of the page. Enter a suitable label and
description, such as Asset and Precise location of each system, then
click Create Key. The key will show up in the custom info keys list.
Once the key exists, you may assign a value to it through the Custom Info tab of the
System Details page. Refer to Section “System Details > Details > Custom Info —
[Prov]” (page 35) for instructions.
4.8.1 mgr-custom-info
In addition to creating and listing custom information keys via the SUSE Manager Web
interface, there is a command-line tool called mgr-custom-info (rhn-cus-
tom-info package) that performs the same actions at a shell prompt.
For example:
mgr-custom-info --username=admin --password=f00b4rb4z \
--server-url=manager.example.com --list-values
The command lists the custom keys and their values for the manager.example.com
SUSE Manager server.
For more information, refer to the help file by typing mgr-custom-info -h.
In the following section, AutoYaST and AutoYaST features apply for SUSE
Linux Enterprise client systems only. For RHEL systems, use Kickstart and
Kickstart features.
Systems 75
SUSE Manager also features the Cobbler installation server. For more information on
Cobbler, refer to Chapter 7, Cobbler (↑Reference Guide).
This overview page displays the status of automated installations (Kickstart and AutoY-
aST) on your client systems: the types and number of profiles you have created and the
progress of systems that are scheduled to be installed using Kickstart or AutoYaST. In
76 User Guide
the upper right is the Autoinstallation Actions section, which contains a series of links
to management actions for your Kickstart or AutoYaST profiles. Before explaining the
various automated installation options on this page, the next two sections provide an in-
troduction to AutoYaST (Section 4.9.1, “Introduction to AutoYaST” (page 77))
and Kickstart (Section 4.9.2, “Introduction to Kickstart” (page 80)).
AutoYaST files can be kept on a single server system and read by individual computers
during the installation. This way the same AutoYaST file is used to install SUSE Linux
Enterprise on multiple machines.
1. After being connected to the network and turned on, the machine's PXE logic
broadcasts its MAC address and requests to be discovered.
2. If no static IP address is used, the DHCP server recognizes the discovery request
and offers network information needed for the new machine to boot. This includes
an IP address, the default gateway to be used, the netmask of the network, the IP ad-
dress of the TFTP or HTTP server holding the bootloader program, and the full path
and file name to that program (relative to the server's root).
3. The machine applies the networking information and initiates a session with the
server to request the bootloader program.
4. The bootloader searches for its configuration file on the server from which it was
loaded. This file dictates which Kernel and Kernel options, such as the initial RAM
Systems 77
disk (initrd) image, should be executed on the booting machine. Assuming the boot-
loader program is SYSLINUX, this file is located in the pxelinux.cfg directo-
ry on the server and named the hexadecimal equivalent of the new machine's IP ad-
dress. For example, a bootloader configuration file for SUSE Linux Enterprise Serv-
er should contain:
port 0
prompt 0
timeout 1
default autoyast
label autoyast
kernel vmlinuz
append autoyast=http://my_susemanager_server/path \
install=http://my_susemanager_server/repo_tree
5. The machine accepts and uncompresses the initrd and kernel, boots the kernel,
fetches the instsys from the install server and initiates the AutoYaST installation with
the options supplied in the bootloader configuration file, including the server con-
taining the AutoYaST configuration file.
6. The new machine is installed based on the parameters established within the AutoY-
aST configuration file.
• A DHCP server is not required for AutoYaST, but it can make things easier. If you
are using static IP addresses, you should select static IP while developing your Au-
toYaST profile.
• Host the AutoYaST distribution trees via HTTP, properly provided by SUSE Man-
ager.
• Configure DHCP to assign the required networking parameters and the boot-
loader program location.
• In the bootloader configuration file, specify the kernel and appropriate kernel
options to be used.
78 User Guide
4.9.1.3 Building Bootable AutoYaST ISOs
While you can schedule a registered system to be installed by AutoYaST with a new
operating system and package profile, you can also automatically install a system that is
not registered with SUSE Manager, or does not yet have an operating system installed.
One common method of doing this is to create a bootable CD-ROM that is inserted
into the target system. When the system is rebooted or switched on, it boots from the
CD-ROM, loads the AutoYaST configuration from your SUSE Manager, and proceeds
to install SUSE Linux Enterprise Server according to the AutoYaST profile you have
created.
1 To create an AutoYaST profile, copy the contents of the loader/ directory (e.g.,
.../mounted-iso/boot/i386/loader/) from the installation medium of
the target distribution to a temporary location (e.g., the current directory):
mkdir loader
cp .../mounted-iso/boot/i386/loader/* loader
2 Edit the isolinux.cfg file in the temporary loader/ directory to boot au-
toyast by default and add an autoyast section:
default autoyast
label autoyast
kernel vmlinuz
append textmode=1 autoyast=url initrd=initrd \
install=url_repo_tree
NOTE: IP Range
The AutoYaST distribution defined by the IP range should match the distri-
bution from which you are building the ISO, otherwise errors will occur.
Systems 79
Note that loader/ is the relative path to the directory containing the modified
isolinux files copied from the distribution medium, while file.iso is the output
ISO file, which is placed into the current directory.
To use the CD-ROM, boot the system and type autoyast at the prompt (assuming
you left the label for the AutoYaST boot as autoyast). When you press Enter, the
AutoYaST installation begins.
For more information about image creation, refer to the SUSE Linux Enterprise Server
Deployment Guide, Part “Imaging and Creating Products”.
To use this method, make sure your systems have network interface cards (NIC) that
support PXE, install and configure a PXE server, ensure DHCP is running, and place
the installation repository on an HTTP server for deployment. Finally upload the Au-
toYaST profile via the Web interface to the SUSE Manager server. Once the AutoY-
aST profile has been created, use the URL from the Autoinstallation Overview page, as
for CD-ROM-based installations.
To obtain specific instructions for conducting PXE AutoYaST installation, refer to the
Using PXE Boot section of the SUSE Linux Enterprise Deployment Guide.
80 User Guide
Kickstart files can be kept on a single server and read by individual computers during
the installation. This method allows you to use one Kickstart file to install Red Hat En-
terprise Linux on multiple machines.
The Red Hat Enterprise Linux System Administration Guide contains an in-depth de-
scription of Kickstart (http://www.redhat.com/docs/manuals/enter
prise/).
1. After being connected to the network and turned on, the machine's PXE logic
broadcasts its MAC address and requests to be discovered.
2. If no static IP address is used, the DHCP server recognizes the discovery request
and offers network information needed for the new machine to boot. This informa-
tion includes an IP address, the default gateway to be used, the netmask of the net-
work, the IP address of the TFTP or HTTP server holding the bootloader program,
and the full path and file name of that program (relative to the server's root).
3. The machine applies the networking information and initiates a session with the
server to request the bootloader program.
4. The bootloader searches for its configuration file on the server from which it was
loaded. This file dictates which kernel and kernel options, such as the initial RAM
disk (initrd) image, should be executed on the booting machine. Assuming the boot-
loader program is SYSLINUX, this file is located in the pxelinux.cfg directo-
ry on the server and named the hexadecimal equivalent of the new machine's IP ad-
dress. For example, a bootloader configuration file for Red Hat Enterprise Linux
AS 2.1 should contain:
port 0
prompt 0
timeout 1
default My_Label
label My_Label
kernel vmlinuz
append ks=http://my_susemanager_server/path \
initrd=initrd.img network apic
Systems 81
5. The machine accepts and uncompresses the init image and kernel, boots the kernel,
and initiates a Kickstart installation with the options supplied in the bootloader con-
figuration file, including the server containing the Kickstart configuration file.
6. This Kickstart configuration file in turn directs the machine to the location of the in-
stallation files.
7. The new machine is built based on the parameters established within the Kickstart
configuration file.
• A DHCP server is not required for kickstarting, but it can make things easier. If you
are using static IP addresses, select static IP while developing your Kickstart profile.
• An FTP server can be used instead of hosting the Kickstart distribution trees via
HTTP.
• If conducting a bare metal Kickstart, you should configure DHCP to assign required
networking parameters and the bootloader program location. Also, specify within
the bootloader configuration file the kernel to be used and appropriate kernel op-
tions.
To do this, copy the contents of /isolinux from the first CD-ROM of the target
distribution. Then edit the isolinux.cfg file to default to 'ks'. Change the 'ks' sec-
tion to the following template:
82 User Guide
label ks
kernel vmlinuz
append text ks=url initrd=initrd.img lang= devfs=nomount \
ramdisk_size=16438 ksdevice
The Kickstart distribution defined via the IP range should match the distribution from
which you are building, or errors will occur. ksdevice is optional, but looks like:
ksdevice=eth0
It is possible to change the distribution for a Kickstart profile within a family, such as
Red Hat Enterprise Linux AS 4 to Red Hat Enterprise Linux ES 4, by specifying the
new distribution label. Note that you cannot move between versions (4 to 5) or between
updates (U1 to U2).
Next, customize isolinux.cfg further for your needs by adding multiple Kickstart
options, different boot messages, shorter timeout periods, etc.
Next, create the ISO as described in the Making an Installation Boot CD-ROM section
of the Red Hat Enterprise Linux Installation Guide. Alternatively, issue the command:
mkisofs -o file.iso -b isolinux.bin -c boot.cat -no-emul-boot \
-boot-load-size 4 -boot-info-table -R -J -v -T isolinux/
Note that isolinux/ is the relative path to the directory containing the modified
isolinux files copied from the distribution CD, while file.iso is the output ISO
file, which is placed into the current directory.
Burn the ISO to CD-ROM and insert the disc. Boot the system and type "ks" at the
prompt (assuming you left the label for the Kickstart boot as 'ks'). When you press En-
ter, Kickstart starts running.
To use this method, make sure your systems have network interface cards (NIC) that
support PXE. Install and configure a PXE server and ensure DHCP is running. Then
Systems 83
place the appropriate files on an HTTP server for deployment. Once the Kickstart pro-
file has been created, use the URL from the Kickstart Details page, as for CD-ROM-
based installs.
To obtain specific instructions for conducting PXE Kickstarts, refer to the PXE Net-
work Installations chapter of the Red Hat Enterprise Linux 4 System Administration
Guide.
NOTE: Tip
Running the Network Booting Tool, as described in the Red Hat Enterprise
Linux 4: System Administration Guide, select "HTTP" as the protocol and in-
clude the domain name of the SUSE Manager in the Server field if you intend
to use it to distribute the installation files.
The following sections describe the autoinstallation options available from the Systems
> Autoinstallation page.
84 User Guide
4.9.3 Autoinstallation Profiles (Kickstart
and AutoYaST)
Figure 4.4: Autoinstallation Profiles
This page lists all profiles for your organization, shows whether these profiles are ac-
tive, and specifies the distribution tree with which each profile is associated. You can
either create a new Kickstart profile by clicking the create new kickstart profile link, up-
load or paste the contents of a new profile using the upload new kickstart/autoyast file,
or edit an existing Kickstart profile by clicking the name of the profile. Note, you can
only update AutoYaST profiles using the upload button. You can also view AutoYaST
profiles in the edit box or change the virtualization type using the selection list.
Systems 85
4.9.4 Create a New Kickstart Profile
Click on the create new kickstart profile link from the Systems > Autoinstallation page to
start the wizard that populates the base values needed for a Kickstart profile.
1 On the first line, enter a Kickstart profile label. This label cannot contain spaces, so
use dashes (-) or underscores (_) as separators.
2 Select a Base Channel for this profile, which consists of packages based on a specif-
ic architecture and Red Hat Enterprise Linux release.
3 Select an Autoinstallable Tree for this profile. The Autoinstallable Tree drop-
down menu is only populated if one or more distributions have been created for
the selected base channel (see Section 4.9.8, “Autoinstallation > Distributions —
[Prov]” (page 97)).
4 Instead of selecting a specific tree, you can also check the box Always use the newest
Tree for this base channel. This setting lets SUSE Manager automatically pick the
latest tree that is associated with the specified base channels. If you add new trees
later, SUSE Manager will always keep the most recently created or modified.
6 On the second page, select (or enter) the location of the Kickstart tree.
Depending on your base channel, your newly created Kickstart profile might be sub-
scribed to a channel that is missing required packages. For Kickstart to work properly,
the following packages should be present in its base channel: pyOpenSSL, rhnlib,
libxml2-python, and spacewalk-koan and associated packages.
• Make sure that the Tools software channel for the Kickstart profile's base channel is
available to your organization. If it is not, you must request entitlements for the Tools
software channel from the SUSE Manager administrator.
• Make sure that the Tools software channel for this Kickstart profile's base channel is
available to your SUSE Manager as a child channel.
86 User Guide
• Make sure that rhn-kickstart and associated packages corresponding to this
Kickstart are available in the Tools child channel.
The final stage of the wizard presents the Autoinstallation Details > Details tab. On this
tab and the other subtabs, nearly every option for the new Kickstart profile can be cus-
tomized.
Once created, you can access the Kickstart profile by downloading it from the Au-
toinstallation Details page by clicking the Autoinstallation File subtab and clicking the
Download Autoinstallation File link.
If the Kickstart file is not managed by SUSE Manager, you can access it via the follow-
ing URL:
http://my.manager.server/ks/dist/ks-rhel-ARCH-VARIANT-VERSION
In the above example, ARCH is the architecture of the Kickstart file, VARIANT is ei-
ther client or server, and VERSION is the release of Red Hat Enterprise Linux
associated with the Kickstart file.
Figure 4.5, “Autoinstallation Details” (page 87) shows the subtabs that are avail-
able. On the Autoinstallation Details > Details page, you have the following options:
Systems 87
NOTE
Changing the Virtualization Type may require changes to the Kickstart pro-
file bootloader and partition options, potentially overwriting user customiza-
tions. Consult the Partitioning tab to verify any new or changed settings.
• Change the amount of Virtual Memory (in Megabytes of RAM) allocated to virtual
guests autoinstalled with this profile.
• Change the amount of Virtual Disk Space (in GB) allotted to each virtual guest.
• Check whether to enable logging for custom %post scripts to the /root/ks-
post.log file.
• Decide whether to enable logging for custom %pre scripts to the /root/ks-
pre.log file.
• Choose whether to preserve the ks.cfg file and all %include fragments to the /
root/ directory of all systems autoinstalled with this profile.
• Select whether this profile is the default for all of your organization's Kickstarts by
checking or unchecking the box.
• Enter comments that are useful to you in distinguishing this profile from others.
88 User Guide
4.9.4.2 Autoinstallation Details > Operating
System — [Prov]
On this page, you can make the following changes to the operating system that the
Kickstart profile installs:
Child Channels
Subscribe to available child channels of the base channel, such as the Tools chan-
nel.
Available Trees
Use the drop-down menu to choose from available trees associated with the base
channel.
For example, if you want to autoinstall a system that joins the network of a specified
organization (for example the Engineering department), you can create a profile vari-
able to set the IP address and the gateway server address to a variable that any system
using that profile will use. Add the following line to the Variables text box.
IPADDR=192.168.0.28
GATEWAY=192.168.0.1
Systems 89
Now you can use the name of the variable in the profile instead of a specific value. For
example, the network part of a Kickstart file looks like the following:
network --bootproto=static --device=eth0 --onboot=on --ip=$IPADDR \
--gateway=$GATEWAY
NOTE
There is a hierarchy when creating and using variables in Kickstart files. Sys-
tem Kickstart variables take precedence over Profile variables, which in turn
take precedence over Distribution variables. Understanding this hierarchy
can alleviate confusion when using variables in Kickstarts.
Using variables are just one part of the larger Cobbler infrastructure for creating tem-
plates that can be shared between multiple profiles and systems. For more information
about Cobbler and templates, refer to Chapter 7, Cobbler (↑Reference Guide).
90 User Guide
4.9.4.7 Autoinstallation Details > Bare Metal
Autoinstallation — [Prov]
This subtab provides the information necessary to Kickstart systems that are not cur-
rently registered with SUSE Manager. Using the on-screen instructions, you may either
autoinstall systems using boot media (CD-ROM) or by IP address.
Figure 4.6, “System Details” (page 91) shows the subtabs that are available from
the System Details tab.
On the System Details > Details page, you have the following options:
Systems 91
partition /boot --fstype=ext3 --size=200
partition swap --size=2000
partition pv.01 --size=1000 --grow
volgroup myvg pv.01 logvol / --vgname=myvg --name=rootvol --size=1000 --grow
NOTE
Any GPG key you wish to export to the kickstarted system must be in ASCII
rather than binary format.
Bootloader
For some headless systems, it is better to select the non-graphic LILO bootloader.
Kernel Parameters
Enter kernel parameters here that may help to narrow down the source of hardware
issues.
92 User Guide
4.9.4.14 Software > Package Groups — [Prov]
Figure 4.7: Software
Figure 4.7, “Software” (page 93) shows the subtabs that are available from the Soft-
ware tab.
Enter the package groups, such as @office or @admin-tools you would like
to install on the kickstarted system in the large text box. If you would like to know
what package groups are available, and what packages they contain, refer to the Red
Hat/base/ file of your Kickstart tree.
The Activation Keys tab allows you to select Activation Keys to include as part of the
Kickstart profile. These keys, which must be created before the Kickstart profile, will
be used when re-registering kickstarted systems.
Systems 93
4.9.4.17 Scripts — [Prov]
Figure 4.9: Scripts
The Scripts tab is where %pre and %post scripts are created. This page lists any scripts
that have already been created for this Kickstart profile. To create a new Kickstart
script, perform the following procedure:
1 Click the add new kickstart script link in the upper right.
2 Enter the path to the scripting language used to create the script, such as /usr/
bin/perl.
4 Indicate whether this script is to be executed in the %pre or %post section of the
Kickstart process.
5 Indicate whether this script is to run outside of the chroot environment. Refer to the
Post-installation Script section of the Red Hat Enterprise Linux System Administration
Guide for further explanation of the nochroot option.
NOTE
SUSE Manager supports the inclusion of separate files within the Partition
Details section of the Kickstart profile. For instance, you may dynamically
generate a partition file based on the machine type and number of disks at
Kickstart time. This file can be created via %pre script and placed on the sys-
tem, such as /tmp/part-include. Then you can call for that file by enter-
ing the following line in the Partition Details field of the System Details > Parti-
tioning tab:
%include /tmp/part-include
94 User Guide
4.9.4.18 Autoinstallation File — [Prov]
Figure 4.10: Autoinstallation File
The Autoinstallation File tab allows you to view or download the profile that has been
generated from the options chosen in the previous tabs.
1 In the first line, enter a profile Label for the automated installation. This label can-
not contain spaces, so use dashes (-) or underscores (_) as separators.
2 Select an Autoinstallable Tree for this profile. The Autoinstallable Tree drop-
down menu is only populated if one or more distributions have been created for
the selected base channel (see Section 4.9.8, “Autoinstallation > Distributions —
[Prov]” (page 97)).
3 Instead of selecting a specific tree, you can also check the box Always use the newest
Tree for this base channel. This setting lets SUSE Manager automatically pick the
latest tree that is associated with the specified base channels. If you add new trees
later, SUSE Manager will always keep the most recently created or modified.
NOTE
If you do not intend to use the autoinstall profile to create virtual guest sys-
tems, you can leave the drop-down set to the default choice KVM Virtual-
ized Guest.
5 Finally, either provide the file contents with cut-and-paste or update the file from
the local storage medium:
Systems 95
• Paste it into the File Contents box and click Create, or
• enter the file name in the File to Upload field and click Upload File.
Once done, four subtabs are available: Details (see Section 4.9.4.8, “System Details >
Details — [Prov]” (page 91)), Bare Metal Kickstart (see Section 4.9.4.7, “Autoin-
stallation Details > Bare Metal Autoinstallation — [Prov]” (page 91)),Variables
(see Section 4.9.4.3, “Autoinstallation Details > Variables” (page 89)), and Autoin-
stallable File (see Section 4.9.4.18, “Autoinstallation File — [Prov]” (page 95)) are
available.
To create a new key/certificate, click the create new stored key/cert link in the up-
per-right corner of the page. Enter a description, select the type, upload the file, and
click the Update Key button. Note that a unique description is required.
IMPORTANT
The GPG key you upload to SUSE Manager must be in ASCII format. Us-
ing a GPG key in binary format causes anaconda, and therefore the Kickstart
process, to fail.
96 User Guide
4.9.8 Autoinstallation > Distributions —
[Prov]
The Distributions page enables you to find and create custom installation trees that may
be used for automated installations.
NOTE
The Distributions page does not display distributions already provided. They
can be found within the Distribution drop-down menu of the Autoinstallation
Details page.
2a Enter a label (without spaces) in the Distribution Label field, such as my-
orgs-sles-11-sp1 or my-orgs-rhel-as-5.
2b In the Tree Path field, paste the path to the base of the installation tree.
For Red Hat Enterprise Linux systems, you can test this by appending "im-
ages/pxeboot/README" to the URL in a Web browser, pressing Enter, and
ensuring that the readme file appears.
2c Select the matching distribution from the Base Channel and Installer Gener-
ation drop-down menus, such as SUSE Linux for SUSE Linux Enterprise,
or Red Hat Enterprise Linux 5 for Red Hat Enterprise Linux 5
client systems.
Systems 97
4.9.8.1 Autoinstallation > Distributions > Variables
Autoinstallation variables can be used to substitute values into Kickstart and AutoY-
aST profiles. To define a variable, create a name-value pair (name/value) in the
text box.
For example, if you want to autoinstall a system that joins the network of a specified
organization (for example the Engineering department) you can create a profile vari-
able to set the IP address and the gateway server address to a variable that any system
using that profile will use. Add the following line to the Variables text box.
IPADDR=192.168.0.28
GATEWAY=192.168.0.1
To use the distribution variable, use the name of the variable in the profile to substitute
the value. For example, the network part of a Kickstart file looks like the following:
network --bootproto=static --device=eth0 --onboot=on --ip=$IPADDR \
--gateway=$GATEWAY
NOTE
There is a hierarchy when creating and using variables in Kickstart files. Sys-
tem Kickstart variables take precedence over Profile variables, which in turn
take precedence over Distribution variables. Understanding this hierarchy
can alleviate confusion when using variables in Kickstarts.
Using variables are just one part of the larger Cobbler infrastructure for creating tem-
plates that can be shared between multiple profiles and systems. For more information
about Cobbler and templates, refer to Chapter 7, Cobbler (↑Reference Guide).
98 User Guide
started, enter them here as a list and associate that list with the Kickstart profile to be
used.
To use this feature, click the create new file preservation list link at the top. Enter a
suitable label and all files and directories to be preserved. Enter absolute paths to all
files and directories. Then click Create List.
IMPORTANT
Although file preservation is useful, it does have limitations. Each list is limit-
ed to a total size of 1 MB. Special devices like /dev/hda1 and /dev/sda1
are not supported. Only file and directory names may be entered. No regular
expression wildcards can be used.
When finished, you may include the file preservation list in the Kickstart profile to be
used on systems containing those files. Refer to Section 4.9.4, “Create a New Kickstart
Profile” (page 86) for precise steps.
When you create a snippet with the create new snippet link, all profiles including that
snippet will be updated accordingly.
Systems 99
4.9.10.2 Autoinstallation > Autoinstallation
Snippets > Custom Snippets
This is the tab with custom snippets. Click a name of a snippet to view, edit, or delete
it.
The Patches Overview page displays relevant patches for at least one of your managed
systems that have not been applied yet.
SUSE distinguishes three types of patches: security updates, bug fix updates, and en-
hancement updates. Each patch is comprised of a summary of the problem and solu-
tion, including the RPM packages fixing the problem.
Patches 101
A summary of each patch is provided in list form displaying the type, severity (for se-
curity updates), and subject of the patch, as well as the number of affected systems in
your network.
In addition, you may view patches by product line at the following location: http://
download.novell.com/patch/psdb/. An RSS feed with security updates is
available at https://www.suse.com/support/security/.
Clicking on a patch Advisory takes you to the Details page of the Patch Details page.
Clicking on the number of associated systems takes you to the Affected Systems page of
the Patch Details page. Refer to Section 5.2.2, “Patch Details” (page 104) for more
information.
The All Patches page displays a list of all patches released by SUSE. Like in the
Relevant Patches page, clicking either Advisory or the number of systems affected
takes you to related tabs of the Patch Details page. Refer to Section 5.2.2, “Patch
Details” (page 104) for more information.
Apply all applicable patches to a system by clicking on Systems > Systems in the top and
left navigation bars. Click on the name of an entitled system. Then in the System Details
page click the Patches tab. When the relevant patch list appears, click Select All then
Apply Patches on the bottom right-hand corner of the page. Only patches not sched-
uled, scheduled but failed, or canceled patches are listed. Pending updates are exclud-
ed.
In addition, Management users can apply patches using two other methods:
Patches 103
• To apply a specific patch to one or more systems, locate it in the patch list and click
on the number of systems affected, which takes you to the Affected Systems page
of the Patch Details page. Select the individual systems to be updated and click the
Apply Patches button. Double-check the systems to be updated on the confirmation
page, then click the Confirm button.
• To apply more than one patch to one or more systems, select the systems from the
Systems list and click the Update List button. Click the System Set Manager link
in the left navigation bar, then click the Systems tab. After ensuring the appropri-
ate systems are selected, click the Patch tab, select the patches to apply, and click
the Apply Patch button. Schedule a date and time for the patch to be applied. De-
fault is the current date. Click the Schedule Updates button. You can follow the
progress of the patch application via the Pending Actions list. Refer to Chapter 10,
Schedule (page 151) for more details.
IMPORTANT
If you use scheduled package installation, the packages or patches are in-
stalled via the SUSE Manager daemon. You must enable the SUSE Manag-
er daemon on your systems. Refer to Chapter 3, SUSE Manager Daemon
(↑Reference Guide) for more details.
• Each package is a member of one or more channels. If a selected system is not sub-
scribed to a channel containing the package, the update will not be installed on that
system.
• If a newer version of the package is already installed on the system, the update will
not be installed.
Below the Affected Channels label, all channels that contain the affected package are
listed. Clicking on a channel name displays the Packages subtab of the Channel Details
page for that channel. Refer to Section 6.1.9, “Software Channel Details” (page 114)
for more information.
To determine whether an update has been scheduled, refer to the Status column in the
affected systems table. Possible values are: None, Pending, Picked Up, Completed, and
Failed. This column identifies only the last action related to a patch. For instance, if an
action fails and you reschedule it, this column shows the status of the patch as pending
with no mention of the previous failure. Clicking a status other than None takes you to
the Action Details page. This column corresponds to one on the Patch tab of the System
Details page.
Patches 105
5.3 Advanced Search
The Patches Search page allows you to search through patches by specific criteria.
• Patch Advisory — The SUSE security team codifies advisories in the following way:
SUSE-RU-2011:0030
Results will be grouped by advisory. For example, searching for 'kernel' returns all
package names containing the string kernel, grouped by advisory.
• CVE — The name assigned to the security advisory by the Common Vulnerabilities
and Exposures (CVE) project at http://cve.mitre.org. For example:
CVE-2006-4535
To filter patch search results, check or uncheck the boxes next to the type of advisory:
• Bug Fix Advisory — Patches that fix issues reported by users or discovered during
development or testing.
• Security Advisory — Patches fixing a security issue found during development, test-
ing, or reported by users or a software security clearing house. A security advisory
usually has one or more CVE names associated with each vulnerability found in each
package.
WARNING
If the organization is using both SUSE Manager and SUSE Manager Proxy,
manage patches only on the SUSE Manager since the proxy servers receive
updates directly from it. Managing patches on a proxy in this combined con-
figuration risks putting your servers out of sync.
Patches 107
Patch management distinguishes between published and unpublished patches.
• Published: displays the patch alerts the organization has created and disseminat-
ed. To edit an existing published patch, follow the steps described in Section 5.4.1,
“Creating and Editing Patches” (page 108). To distribute the patch, click Send
Notification on the top-right corner of the Patch Details page. The patch alert is sent
to the administrators of all affected systems.
• Unublished: displays the patch alerts your organization has created but not yet dis-
tributed. To edit an existing unpublished patch, follow the steps described in Sec-
tion 5.4.1, “Creating and Editing Patches” (page 108). To publish the patch, click
Publish Patch on the top-right corner of the Patch Details page. Confirm the chan-
nels associated with the patch and click the Publish Patch button, now in the low-
er-right corner. The patch alert is moved to the Published page awaiting distribution.
1 On the top navigation bar, click on Patches, then select Manage Patches on the left
navigation bar. On the Patch Management page, click create new patch.
2 Enter a label for the patch in the Advisory field, ideally following a naming conven-
tion adopted by your organization.
3 Complete all remaining required fields, then click the Create Patch button. View
standard SUSE Alerts for examples of properly completed fields.
SUSE Manager administrators can also create patches by cloning an existing one.
Cloning preserves package associations and simplifies issuing patches. See Sec-
tion 5.4.4, “Cloning Patches” (page 110) for instructions.
To edit an existing patch alert's details, click its advisory on the Patch Management
page, make the changes in the appropriate fields of the Details tab, and click the Up-
date Patch button. Click on the Channels tab to alter the patch's channel association.
Click on the Packages tab to view and modify its packages.
To delete patches, select their check boxes on the Patch Management page, click the
Delete Patch button, and confirm the action. Note that deleting published patches might
take a few minutes.
1 Select a patch, click on the Packages tab, then the Add subtab.
2 To associate packages with the patch being edited, select the channel from the View
drop-down menu that contains the packages and click View. Packages already asso-
ciated with the patch being edited are not displayed. Selecting All managed packages
presents all available packages.
3 After clicking View, the package list for the selected option appears. Note that the
page header still lists the patch being edited.
4 In the list, select the check boxes of the packages to be assigned to the edited patch
and click Add Packages at the bottom-right corner of the page.
5 A confirmation page appears with the packages listed. Click Confirm to associate
the packages with the patch. The List/Remove subtab of the Managed Patch Details
page appears with the new packages listed.
Once packages are assigned to a patch, the patch cache is updated to reflect the
changes. This update is delayed briefly so that users may finish editing a patch before
all the changes are made available. To initiate the changes to the cache manually, fol-
low the directions to commit the changes immediately at the top of the page.
1 On the top navigation bar, click on Patches, then Manage Patches on the left naviga-
tion bar.
2 Click on Publish Patch. A confirmation page appears that will ask you to select
which channels you wish to make the patch available in. Choose the relevant chan-
nels.
3 Click Publish Patch. The patch published will now appear on the Published page of
Manage Patches.
Patches 109
5.4.4 Cloning Patches
Patches can be cloned for easy replication and distribution as part of SUSE Manager.
Only patches potentially applicable to one of your channels can be cloned. Patches can
be applicable to a channel if that channel was cloned from a channel to which the patch
applies. To access this functionality, click Patches on the top navigation bar, then Clone
Patches on the left navigation bar.
On the Clone Patches page, select the channel containing the patch from the View drop-
down menu and click View. Once the patch list appears, select the check box of the
patch to be cloned and click Clone Patch. A confirmation page appears with the patch
listed. Click Confirm to finish cloning.
The cloned patch appears in the Unpublished patch list. Verify the patch text and the
packages associated with that patch, then publish the patch so it is available to users in
your organization.
There are two types of software channels: base channels and child channels.
A system must be subscribed to only one base channel assigned automatically during
registration based on the SUSE Linux Enterprise release and system architecture. In
case of paid base channels, an associated entitlement must exist.
A system can be subscribed to multiple child channels of its base channel. Only pack-
ages provided by a subscribed channel can be installed or updated. SUSE Manager cus-
tomers have channel management authority. This authority gives them the ability to
create and manage their own custom channels.
NOTE
Do not create child channels containing packages that are not compatible
with the client system.
Channels can be further distinguished by relevance: All Channels, SUSE Channels, Pop-
ular Channels, My Channels, Shared Channels, and Retired Channels.
6.1.6 My Channels
The My Channels page displays all software channels that belong to your organization,
including both SUSE and custom channels. Use the text box to filter by channel name.
[Mgmt] — Only customers with custom base channels can change their systems' base
channel assignments via the SUSE Manager Web interface in two ways:
NOTE
The assigned base channel must match the installed system. For example, a
system running SUSE Linux Enterprise 10 for i586 cannot be registered to a
To search for a specific package or a subset of packages, use the package filter at the
top of the list. Enter a substring to search for package names containing the string. For
example, typing ks in the filter might return: ksconfig, krb5-workstation,
and links. The filter is case-insensitive.
Channels 115
[Mgmt] — In case of a child channel, you have the option to unsubscribe systems from
this channel. Use the check boxes to select the systems, then click the Unsubscribe but-
ton.
The Package Search page allows you to search through packages using various criteria
(provided by the What to search for selection list):
• Name and Summary — Search for a package or program which might not show up
in the respective package name but in its one-line summary.
• Name and Description — Search package names and their descriptions. Search re-
sults for “web browser” include both graphical and text-based browsers.
The Free Form field additionally allows you to search using field names that you
prepend to search queries and filter results by that field keyword.
For example, if you wanted to search all of the SUSE Linux Enterprise packages for
the word java in the description and summary, type the following in the Free Form
field:
summary:java and description:java
• arch: search the packages by their architecture (such as i586, x86_64, or s390).
You can also limit searches to Channels relevant to your systems by clicking the check
box. Additionally, you can restrict your search by platform or architecture.
Channels 117
6.3.1 Manage Software Channels >
Channel Details
The default screen of the Manage Software Channels tab lists all available channels in-
cluding custom, distribution-based, and child channels.
To clone an existing channel, click the clone channels link. Select the channel to be
cloned from the drop-down menu, select whether to clone the current state (including
patches) or the original state (without patches). You can also select specific patches to
use for cloning. Then click the Create Channel button. In the next screen select options
for the new channel, including base architecture and GPG, then click Create Channel.
To create a new channel, click the create new channel link. Select the appropriate op-
tions for the new channel, including base architecture and GPG options, then click Cre-
ate Channel. Note that a channel created in this manner is blank, containing no pack-
ages. You must either upload software packages or add packages from other reposito-
ries. You may also choose to include patches in your custom channel.
To allow all users to manage the channel, click the Select All button at the bottom of
the list then click Update. To remove a user's right to manage the channel, uncheck the
box next to their name and click Update.
The Sync tab lists patches that were updated since they were originally cloned in the se-
lected cloned channel. More specifically, a patch is listed here if and only if:
• it is a cloned patch,
• it does not contain a package that the original patch has, or it has at least one pack-
age with a different version with respect to the corresponding one in the original
patch, or both.
Clicking on the "Sync Patches" button opens a confirmation page in which a subset of
those patches can be selected for synchronization. Clicking on the "Confirm" button in
the confirmation page results in such patches being copied over from the original chan-
nel to the cloned channel, thus updating corresponding packages.
To list all packages in the channel, click the List / Remove Packages link. Check the
box to the left of any package you wish to remove, then click Remove Packages.
To add packages, click the Add Packages link. From the drop down menu choose a
channel from which to add packages and click View to continue. Check the box to the
left of any package you wish to add to the custom channel, then click Add Packages.
Channels 119
To compare packages in the current channel with those in another, select that chan-
nel from the drop-down menu and click Compare. Packages in both channels are com-
pared, including architecture and version. The results are displayed on the next screen.
To make the two channels identical, click the Merge Differences button. In the next di-
alog, resolve any conflicts. Preview Merge allows you to review the changes before ap-
plying them to the channels. Select those packages that you wish to merge. Click Merge
Packages then Confirm to perform the merge.
• Add/Remove lists configured repositories, which can be added and removed by se-
lecting the check box next to the repository name and clicking Update Repositories.
• Sync lists configured repositories. The synchronization schedule can be set using the
drop-down boxes, or an immediate synchronization can be performed by clicking
Sync Now.
The Manage Repositories tab to the left shows all assigned repositories. Click on a
name to see details and possibly delete a repository.
To link the new repository to an existing software channel, select Manage Software
Channels from the left menu, then click the channel you want to link. In the channel's
Detail page, click the Repositories subtab, then check the box next to the repository you
want to link to the channel. Click Update Repositories.
To synchronize packages from a custom repository to your channel, click the Sync link
from the channel's Repositories subtab, and confirm by clicking the Sync button.
You can also perform a sync via command-line by using the spacewalk-re-
po-sync command, which additionally allows you to accept keys.
Channels 121
Audit
7
Select the Audit tab from the top navigation bar to audit your managed systems.
Audit 123
Figure 7.1: CVE Audit
1 Make sure that the CVE data is up-to-date. For more information, see Section 7.1.3,
“Maintaining CVE Data” (page 125).
3 Input a 13-char CVE identifier in the CVE Number field. The year setting will be
automatically adjusted. Alternatively, set the year manually and add the last four dig-
its.
4 Optionally, uncheck the patch statuses you are not interested in.
Then a list of client systems is displayed, where each system comes with a Patch Status
describing its situation regarding the given CVE identifier. Possible statuses are:
Not affected:
The system does not have any packages installed that are patchable.
Patched:
A patch has already been installed.
For a more precise definitions of these states, see Section 7.1.4, “Tips and Background
Information” (page 126).
If the CVE number is not known to SUSE Manager, an error message is dis-
played because SUSE Manager is unable to collect and display any audit da-
ta.
For each system, the Next Action column contains suggestions on the steps to take in or-
der to address the vulnerabilities. Under these circumstances it is either sensible to in-
stall a certain patch or assign a new channel. If applicable, a list of “candidate” chan-
nels or patches is displayed for your convenience.
You can also assign systems to a System Set for further batch processing.
Audit 125
night. It is recommended to run such a refresh right after the SUSE Manager installa-
tion to get proper results immediately instead of waiting until the next day.
6 After some minutes, refresh the page and check that the scheduled run status is
FINISHED.
Systems are called “affected”, “not affected” or “patched” not in an absolute sense, but
based on information available to SUSE Manager. This implies that concepts such as
“being affected by a vulnerability” have particular meanings in this context. The follow-
ing definitions apply:
Relevant channel:
A channel managed by SUSE Manager, which is either assigned to the system, the
original of a cloned channel which is assigned to the system, a channel linked to a
product which is installed on the system or a past or future service pack channel
for the system.
A notable consequence of the above definitions is that results can be incorrect in cases
of unmanaged channels, unmanaged packages, or non-compliant systems.
7.2 OpenSCAP
If you click the OpenSCAP tab on the left navigation bar, an overview of the OpenS-
CAP Scans appears. SCAP (Security Content Automation Protocol) is a framework to
maintain the security of enterprise systems. It mainly performs the following tasks:
For a description of the Web interface dialogs, see Section 8.5, “OpenSCAP SUSE
Manager Web Interface” (page 134).
For instructions and tips on how to best use OpenSCAP with SUSE Manager, refer to
Chapter 8, System Security via OpenSCAP (page 129). To learn more about OpenS-
CAP check out the project homepage at http://open-scap.org.
Audit 127
System Security via
OpenSCAP
8
The Security Certification and Authorization Package (SCAP) is a standardized com-
pliance checking solution for enterprise-level Linux infrastructures. It is a line of speci-
fications maintained by the National Institute of Standards and Technology (NIST) for
maintaining system security for enterprise systems.
SUSE Manager 1.7 and later use OpenSCAP to implement the SCAP specifications.
OpenSCAP is an auditing tool that utilizes the Extensible Configuration Checklist De-
scription Format (XCCDF). XCCDF is a standard way of expressing checklist content
and defines security checklists. It also combines with other specifications such as Com-
mon Platform Enumeration (CPE), Common Configuration Enumeration (CCE), and
Open Vulnerability and Assessment Language (OVAL), to create a SCAP-expressed
checklist that can be processed by SCAP-validated products.
NOTE
SUSE supports the use of templates to evaluate your systems. However, you
are creating custom content at your own risk.
Package Requirements
As Server: SUSE Manager 1.7 or later.
For the Client: spacewalk-oscap package (available from the SUSE Manager
Tools Child Channel).
Entitlement Requirements
A Management entitlement is required for scheduling scans.
Other Requirements
Client: Distribution of the XCCDF content to all client machines.
• RPMs
Custom RPMs are the recommended way to distribute SCAP content to other ma-
chines. RPM packages can be signed and verified to ensure their integrity. Installation,
removal, and verification of RPM packages can be managed from the user interface.
4 Fill in the Schedule New XCCDF Scan form. See Section 8.5.2.3, “Schedule
Page” (page 139) for more information about the fields on this page.
WARNING
Run the mgr_check command to ensure the action is being picked up by the
client system.
mgr_check -vv
If the SUSE Manager daemon (rhnsd) or osad are running on the client
system, the action will be picked up by these services. To check if they are
running, use:
service rhnsd start
or
service osad start
1 To perform an audit scan via API, choose an existing script or create a script for
scheduling a system scan through system.scap.scheduleXccdfScan, the
front end API, for example:
Where:
• /usr/local/share/scap/usgcb-sled11desktop-xccdf.xml
is the path to the content location on the client system. In this case, it assumes
USGCB content in the /usr/local/share/scap directory.
• --profile
united_states_government_configuration_baseline is an ad-
ditional argument for the oscap command. In this case, it is using the USGCB.
2 Run the script on the command-line interface of any system. The system needs the
appropriate Python and XML-RPC libraries installed.
3 Run the mgr_check command to ensure that the action is being picked up by the
client system.
mgr_check -vv
If the SUSE Manager daemon (rhnsd) or osad are running on the client system,
the action will be picked up by these services. To check if they are running, use:
service rhnsd start
or
service osad start
To make sure detailed information about the scan will be available, activate
the upload of detailed SCAP files on the clients to be evaluated. On the Ad-
min page, click on Organization and select one. Click on the Configuration
tab and check Enable Upload Of Detailed SCAP Files. This feature gener-
ates an additional HTML version when you run a scan. The results will show
an extra line like: Detailed Results: xccdf-report.html xc-
cdf-results.xml scap-yast2sec-oval.xml.result.xml.
• Via the Web interface. Once the scan has finished, the results should show up on the
Audit tab of a specific system. This page is discussed in Section 8.5, “OpenSCAP
SUSE Manager Web Interface” (page 134).
System:
the scanned system.
Completed:
time of completion.
Satisfied:
number of rules satisfied. A rule is considered to be satisfied if the result of the
evaluation is either Pass or Fixed.
Dissatisfied:
number of rules that were not satisfied. A rule is considered Dissatisfied if the re-
sult of the evaluation is a Fail.
Unknown:
number of rules which failed to evaluate. A rule is considered to be Unknown if
the result of the evaluation is an Error, Unknown or Not Checked.
The evaluation of XCCDF rules may also return status results like Informational,
Not Applicable, or not Selected. In such cases, the given rule is not included
in the statistics on this page. See System Details > Audit for information on these types
of results.
Click the appropriate icon on the Scans page to access the diff output of similar scans.
Alternatively, specify the ID of scans you want to compare.
Items that show up in only one of the compared scans are considered to be "varying".
Varying items are always highlighted in beige. There are three possible comparison
modes:
Full Comparison
all the scanned items.
Only Invariant:
unchanged or similar items.
• rule results,
• targeted machine,
The search either returns a list of results or a list of scans, which are included in the re-
sults.
Completed
The exact time the scan finished.
Compliance
The unweighted pass/fail ratio of compliance based on the Standard used.
P
Number of checks that passed.
F
Number of checks that failed.
E
Number of errors that occurred during the scan.
U
Unknown.
N
Not applicable to the machine.
K
Not checked.
S
Not Selected.
I
Informational.
Total
Total number of checks.
Each entry starts with an icon indicating the results of a comparison to a previous simi-
lar scan. The icons indicate the following:
• "RHN List Alert" Icon — arbitrary differences between the compared scans.
• "RHN List Error" Icon — major differences between the compared scans. Either
there are more failures than the previous scan or less passes
• "RHN List Check In" Icon — no comparable scan was found, therefore, no compar-
ison was made.
To find out what has changed between two scans in more detail, select the ones you are
interested in and click Compare Selected Scans. To delete scans that are no longer rel-
evant, select those and click on Remove Selected Scans. Scan results can also be down-
loaded in CSV format.
• File System Path: the path to the XCCDF file used for the scan.
• Profile Title: the title of the profile used for the scan.
Command-line Arguments:
Optional arguments to the oscap command, either:
Profiles are determined by the Profile tag in the XCCDF XML file. Use
the oscap command to see a list of profiles within a given XCCDF file,
for example:
If not specified, the default profile is used. Some early versions of OpenS-
CAP in require that you use the --profile option or the scan will fail.
• --skip-valid: Do not validate input and output files. You can use this
option to bypass the file validation process if you do not have well-formed
XCCDF content.
For information about how to schedule scans using the web interface, refer to Proce-
dure 8.1, “Scans via the Web Interface” (page 131).
In this configuration portal, manage your configuration channels and files centrally or
limited to a single system. Centrally-managed files are available to multiple systems;
changes to a single file affect all these systems. Each system with a Provisioning entitle-
ment has also a local configuration channel, sometimes referred to as an override chan-
nel, and a sandbox channel.
• rhncfg — the base libraries and functions needed by all rhncfg-* packages,
Configuration 141
• rhncfg-client — the RPM package with a command line interface to the
client features of the Configuration Management system,
First, enable your system to schedule configuration actions via Actions Control. En-
ter the mgr-actions-control command, provided by the rhncfg-ac
tions RPM, on the client system to enable or disable specific actions. Refer to
Section “Actions Control (mgr-actions-control)” (Appendix A, Command
Line Configuration Management Tools, ↑Reference Guide) for instructions.
9.2 Overview
In the Configuration Overview monitor the status of your configuration files and the
systems using them.
Configuration Summary
The panel provides quick information about your configuration files. Click on the
blue text to the right to display relevant systems, channel details, or configuration
files.
Configuration Actions
Configuration Actions offers direct access to the most common configuration man-
agement tasks. View or create files and channels or enable configuration manage-
ment on your systems.
Central configuration channels must be created via the link on this page. Local config-
uration channels already exist for each system to which a Provisioning entitlement has
been applied.
Click on the name of the configuration channel to see the details page for that chan-
nel. If you click on the number of files in the channel, you are taken to the List/Re-
move Files page of that channel. If you click on the number of systems subscribed to
the configuration channel, you are taken to the Systems > Subscribed Systems page for
that channel.
1. Click the create new config channel link in the upper right of this screen.
3. Enter a label for the channel. This field must contain only alphanumeric characters,
"-", "_", and "."
4. Enter a mandatory description for the channel that allows you to distinguish it from
other channels. No character restrictions apply.
5. Press the Create Config Channel button to create the new channel.
6. The following page is a subset of the Channel Details page and has three sub-
tabs: Overview, Add Files, and Systems. The Channel Details page is discussed in
Section 9.3.1, “Configuration > Configuration Channels > Configuration Channel
Details” (page 144).
Configuration 143
9.3.1 Configuration > Configuration
Channels > Configuration Channel Details
Overview
This subtab is very similar to the Configuration Overview page. The Channel Infor-
mation panel provides status information for the contents of the channel. The Con-
figuration Actions panel provides access to the most common configuration tasks.
The main difference is the Channel Properties panel. By clicking on the Edit Prop-
erties link, you can edit the name, label, and description of the channel.
List/Remove Files
This tab only appears if there are files in the configuration channel. You can re-
move files or copy the latest versions into a set of local overrides or into other cen-
tral configuration channels. Check the box next to files you wish to manipulate and
click the respective action button.
Add Files
The Add Files subtab has three subtabs of its own, which allow you to Upload, Im-
port, or Create configuration files to be included in the channel.
Upload File
To upload a file into the configuration channel, browse for the file on your lo-
cal system, populate all fields, and click the Upload Configuration File button.
The Filename/Path field is the absolute path where the file will be deployed.
You can set the Ownership via the user name and group name as well as the
Permissions of the file when it is deployed.
If the client has SELinux enabled, you can configure SELinux contexts to en-
able the required file attributes (such as user, role, and file type) that allow it
to be used on the system.
Import Files
To import files from other configuration channels, including any locally-man-
aged channels, check the box to the left of any file you wish to import. Then
press the Import Configuration File(s) button.
A sandbox icon indicates that the listed file is currently located in a lo-
cal sandbox channel. Files in a system's sandbox channel are con-
sidered experimental and could be unstable. Use caution when se-
lecting them for a central configuration channel.
Create File
Create a configuration file, directory, or symbolic link from scratch to be in-
cluded in the configuration channel.
First, choose whether you want to create a text file, directory, or symbolic link
(symlink) in the File Type section. In the Filename/Path text input field,
set the absolute path to where the file should be deployed. If you are creating
a symlink, indicate the target file and path in the Symbolic Link Target File-
name/Path input field.
Enter the User name and Group name for the file in the Ownership section, as
well as the File Permissions Mode.
If the client has SELinux enabled, you can configure SELinux contexts to en-
able the required file attributes (such as user, role, and file type) that allow it
to be used on the system.
If the configuration file includes a macro, enter the symbol that marks the be-
ginning and end of the macro. Then enter the configuration file content in the
File Contents field, using the script drop-down menu to choose the appropri-
ate scripting language. Press the Create Configuration File button to create the
new file.
Deploy Files
This subtab only appears when there are files in the channel. Deploy all files by
clicking the Deploy All Files button or check selected files and click the Deploy
Selected Files button. Select to which systems the file(s) should be applied. All sys-
tems subscribed to this channel are listed. If you wish to apply the file to a differ-
ent system, subscribe it to the channel first. To deploy the files, press Confirm and
Deploy to Selected Systems.
Systems
Manage systems subscribed to the configuration channel via two subtabs:
Configuration 145
Subscribed Systems
All systems subscribed to the current channel are displayed. Click on the name
of a system to see the System Details page.
Target Systems
This subtab displays a list of systems enabled for configuration management
but not yet subscribed to the channel. To add a system to the configuration
channel, check the box to the left of the system's name and press the Subscribe
System button.
NOTE
Change the value of both the variables to the desired value in bytes in /etc/rhn/
rhn.conf, e.g.:
server.maximum_config_file_size=262144
web.maximum_config_file_size=262144
The list of all local (override) configuration files for your systems includes the local
configuration channels and the sandbox channel for each Provisioning-entitled system.
Click the Path of the file to see its Config File Details. Click the name of the system to
which it belongs to see its System Details > Configuration > Overview page.
Traditional file management would require to upload and distribute each file separate-
ly, even if the distinction is nominal and the number of variations is in the hundreds or
thousands. SUSE Manager addresses this by allowing the inclusion of macros, or vari-
ables, within the configuration files it manages for Provisioning-entitled systems. In ad-
dition to variables for custom system information, the following standard macros are
supported:
• rhn.system.sid
Configuration 147
• rhn.system.profile_name
• rhn.system.description
• rhn.system.hostname
• rhn.system.ip_address
• rhn.system.custom_info(key_name)
• rhn.system.net_interface.ip_address(eth_device)
• rhn.system.net_interface.netmask(eth_device)
• rhn.system.net_interface.broadcast(eth_device)
• rhn.system.net_interface.hardware_address(eth_device)
• rhn.system.net_interface.driver_module(eth_device)
To use this powerful feature, either upload or create a configuration file via the Con-
figuration Channel Details page. Then open its Configuration File Details page and in-
clude the supported macros of your choice. Ensure that the delimiters used to offset
your variables match those set in the Macro Start Delimiter and Macro End Delimiter
fields and do not conflict with other characters in the file. We recommend that the de-
limiters be two characters in length and must not contain the percent (%) symbol.
For example, you may have a file applicable to all of your servers that differs only in IP
address and host name. Rather than manage a separate configuration file for each serv-
er, you may create a single file, such as server.conf, with the IP address and host
name macros included.
hostname={| rhn.system.hostname |}
ip_address={| rhn.system.net_interface.ip_address(eth0) |}
Upon delivery of the file to individual systems, whether through a scheduled action
in the SUSE Manager Web interface or at the command line with the SUSE Manager
Configuration Client (mgrcfg-client), the variables will be replaced with the host
name and IP address of the system as recorded in SUSE Manager's system profile. In
the above example configuration file the deployed version resembles the following:
hostname=test.example.domain.com
ip_address=177.18.54.7
To capture custom system information, insert the key label into the custom information
macro (rhn.system.custom_info). For instance, if you developed a key labeled "asset"
When the file is deployed to a system containing a value for that key, the macro gets
translated, resulting in a string similar to the following:
asset=Example#456
To include a default value, for instance if one is required to prevent errors, you can ap-
pend it to the custom information macro, like this:
asset={@ rhn.system.custom_info(asset) = 'Asset #' @}
9.5 Systems
This page displays status information about your system in relation to configuration.
There are two subtabs: Managed Systems and Target Systems.
Configuration 149
tifies the system name, the second shows whether the system is prepared for configu-
ration file deployment, and the third lists the steps necessary to prepare the system. To
prepare a system, check the box to the left of the profile name then press the Enable
SUSE Manager Configuration Management button. All of the preparatory steps that can
be automatically performed are scheduled by SUSE Manager.
NOTE
You will have to perform some manual tasks to enable configuration file de-
ployment. Follow the on-screen instructions provided to assist with each step.
3. system reboots,
4. patch application,
10.remote commands.
Schedule 151
Each page in the Schedule category represents an action status.
For all these operations, the action can either be scheduled for a certain date and time
or added to an action chain. To create a new one, configure the first action (e.g. run-
ning a remote command), then select Add to Action Chain instead of Schedule no soon-
er than:. Click on the drop-down menu, enter a name, and click Schedule to save the
chain. Then proceed to the next action and add it to the new chain.
An action chain can be executed on all the systems it applies to. If more than one ac-
tion applies to the same system, corresponding supported operations will be executed
sequentially in action chain order. If a supported operation fails on a system, no further
supported operations will be executed on that system.
NOTE
Action chains can be edited via the Schedule > Action Chains page. Click on a chain
name to see the actions in the order they will be performed. The following tasks can be
carried out here:
• Changing the order by dragging the respective action to the right position and drop-
ping it.
• Deleting actions from the chain by clicking on the delete action link.
Schedule 153
• Inspecting the list of systems on which an action is run by clicking on the + sign.
• Deleting a single system from an action by clicking on the delete system link.
• Deleting the complete chain with the delete action chain link in the top-left corner.
• Scheduling the action chain for execution after a certain date by clicking on the Save
and Schedule button.
NOTE
Note that if you leave the page without clicking on either Save or Save and
Schedule all unsaved changes will be discarded. In this case, a confirmation
dialog will pop up.
Currently you cannot add an action to an action chain from the Edit page. Once a Chain
is scheduled, the actions it contains will be displayed under Schedule on the appropriate
pages: Pending Actions, Failed Actions or Completed Actions, depending on the status.
If one action fails on a system no other actions from the same chain will be executed on
that systems. Due to technical limitations it is not possible to reuse Action Chains
• Filter by Action — Enter a term to filter the listed actions or use the check boxes in
this column to select actions. Then either add them to your selection list or archive
them by clicking Archive Actions. If you archive a pending action, it is not canceled,
but the action item moves from the Pending Actions list to the Archived Actions list.
• Scheduled Time — The earliest day and time the action will be performed.
• Failed — Number of systems on which this action has been tried and failed.
• Total — Total number of systems on which this action has been scheduled.
Schedule 155
Users — [Mgmt]
11
Only SUSE Manager administrators can see the Users tab on the top navigation bar. If
you click the tab, the Users category and links appear. Here you grant and edit permis-
sions for those who administer your system groups. Click on a name in the User List to
modify the user.
To add new users to your organization, click the create new user link on the top right
corner of the page. On the Create User page, fill in the required values for the new
user.
Once all fields are completed, click the Create Login button. SUSE Manager now sends
an email to the specified address and takes you back to the Users > User List > Active
page. If you wish to set permissions and options for the new user, click on the name in
the list. The User Details page for this user provides several subtabs of options. Refer
to Section 11.1.1, “User List > Active > User Details — [Mgmt]” (page 158) for de-
tailed descriptions of each subtab.
As shown in Figure 11.1, “User List” (page 158), each row in the User List repre-
sents a user within your organization. There are four columns of information for each
user:
• Real Name — The full name of the user (last name first).
• Roles — List of the user's privileges, such as organization administrator, channel ad-
ministrator and normal user. Users can have multiple roles.
• Last Sign In — Shows when the user last logged in to SUSE Manager.
Users can be deactivated directly in the SUSE Manager Web interface. SUSE Manag-
er administrators can deactivate or delete users of their organization, but users can also
deactivate their own accounts.
Deactivated users cannot log in to the SUSE Manager Web interface or schedule any
actions. SUSE Manager administrators cannot be deactivated until that role is removed
from their account. Actions scheduled by a user prior to their deactivation remain in the
action queue. Deactivated users can be reactivated by SUSE Manager administrators.
To deactivate a user:
2 Verify that the user is not a SUSE Manager administrator. If they are, uncheck the
box to the left of that role and click the Submit button.
3 Click the deactivate user link in the upper right of the screen.
To delete a user:
2 Verify that the user is not a SUSE Manager administrator. Uncheck the box to re-
move the role if necessary.
• User — Also known as a System Group User, this is the standard role associated with
any newly created user. This person may be granted access to manage system groups
and software channels, if the SUSE Manager administrator sets the roles according-
ly. The systems must be in system groups for which the user has permissions to man-
age them. However, all globally subscribable channels may be used by anyone.
• Channel Administrator — This role provides a user with full access to all software
channels within your organization. This requires the SUSE Manager synchronization
tool (mgr-ncc-sync). The channel administrator may change the base channels
of systems, make channels globally subscribable, and create entirely new channels.
• Organization Administrator — This role provides a user with all the permissions oth-
er administrators have, namely the activation key, configuration, monitoring, chan-
nel, and system group administrator.
• Monitoring Administrator — This role allows for the scheduling of probes and over-
sight of other monitoring infrastructure. This role is available only on a monitor-
ing-enabled SUSE Manager server. Activate monitoring in Admin > SUSE Manager
Configuration > General and click on Enable Monitoring. See Chapter 12, Monitoring
— [Mon] (page 165) for more information.
• SUSE Manager Administrator — This role allows a user to perform any function
available in SUSE Manager. As the master account for your organization, the person
• System Group Administrator — This role is one step below SUSE Manager adminis-
trator: full authority is limited to systems or system groups to which access is grant-
ed. The System Group Administrator can create new system groups, delete any
assigned systems from groups, add systems to groups, and manage user access to
groups.
Being a SUSE Manager administrator enables you to remove administrator rights from
other users. It is possible to remove your own privileges as long as you are not the only
SUSE Manager administrator.
To assign a new role to a user, check the respective box. SUSE Manager administrators
are automatically granted administration access to all other roles, signified by grayed-
out check boxes. Click Submit to submit your changes.
11.1.1.2 User List > Active > User Details > System
Groups — [Mgmt]
This tab displays a list of system groups the user may administer. SUSE Manager ad-
ministrators can set this user's access permissions to each system group. Check or
uncheck the box to the left of the system group and click the Update Permissions but-
ton to save the changes.
SUSE Manager administrators may select one or more default system groups for a user.
When the user registers a system, it gets assigned to the selected group or groups. This
allows the user to access the newly-registered system immediately. System groups to
which this user has access are preceded by an (*).
User List > Active > User Details > Channel Permissions >
Subscription — [Mgmt]
Identifies channels to which the user may subscribe systems. To change these, select
or deselect the appropriate check boxes and click the Update Permissions button. Note
that channels subscribable due to the user's administrator status or the channel's global
settings cannot be altered. They are identified with a check icon.
User List > Active > User Details > Channel Permissions >
Management — [Mgmt]
Identifies channels the user may manage. To change these, select or deselect the appro-
priate check boxes and click the Update Permissions button. The permission to manage
channels does not enable the user to create new channels. Note that channels automati-
cally manageable through the user's admin status cannot be altered. These channels are
identified with a check icon. Remember, SUSE Manager administrators and channel
administrators can subscribe to or manage any channel.
• SUSE Manager List Page Size: Maximum number of items that appear in a list on a
single page. If the list contains more items than can be displayed on one page, click
the Next button to see the next page. This preference applies to the user's view of
system lists, patch lists, package lists, and so on.
• CSV Files: Select whether to use the default comma or a semicolon as separator in
downloadable CSV files.
Change these options to fit your needs, then click the Save Preferences button. To
change the time zone for this user, click on the Locale subtab and select from the drop-
down menu. Dates and times, like system check-in times, will be displayed according
to the selected time zone. Click Save Preferences for changes to take effect.
If a notification method has probes attached, they are listed as well. If you are a moni-
toring administrator but don't have management rights for a system, its System Details
Manage the configuration of your monitoring infrastructure and view the results of
probes monitoring entitled systems.
Initiate monitoring of a system through the Probes tab on the System Details page. Re-
fer to Section 4.2.14, “System Details” (page 27) for a description of the tab. See Ap-
pendix B, Probes (↑Reference Guide) for the complete list of available probes.
Click Monitoring in the top navigation bar to see the Probe Status List. The page dis-
plays the summary count of probes in the various states and provides a simple inter-
face to find problematic probes quickly. Note that the total number of probes displayed
in the tabs at the top of the page may not match the numbers of probes displayed in
the tables below. The counts at the top include probes for all systems in your organiza-
tion, while the tables only display probes on those systems you have access to as system
group administrator. Also, the probe counts displayed here may be out of sync by as
much as one minute.
— Unknown: the probe is not able to accurately report metric or state data.
— Pending: the probe has been scheduled but not yet run or is unable to
run.
The Probe Status List page contains tabs for each of the possible states, as well as one
that lists all probes. Each table contains columns indicating probe state, the monitored
system, the probes used, and the date and time the state was last updated.
In these tables, clicking the name of the system takes you to the Monitoring tab of the
System Details page. Clicking the name of the probe takes you to its Current State page.
From there, you may edit the probe, delete it, and generate reports based on its results.
Monitoring data and probe status information available on the Web interface of
SUSE Manager can also be exported as a CSV file. Click on the Download CSV links
throughout the Monitoring pages to download CSV files of relevant information. The
exported data may include, but is not limited to:
• probe status,
The probes that have crossed their “critical” thresholds or reached a critical status by
some other means. For instance, some probes become critical (rather than unknown)
when exceeding their timeout period.
The probes that cannot collect the metrics needed to determine probe state. Most but
not all probes enter an unknown state when exceeding their timeout period. This may
mean that the timeout period should be increased, or the connection cannot be estab-
lished to the monitored system.
It is also possible the probes' configuration parameters are not correct and their data
cannot be found. This state may also indicate that a software error has occurred.
The probes that have run successfully without exception. This is the state desired for all
probes.
All probes scheduled on systems in your account, listed in alphabetical order by the
name of system.
Identifies the selected probe's status and when it last ran, while providing the ability to
generate a report on the probe. Although this page is integral to monitoring, it is found
under the Probes tab within the System Details page since its configuration is specific to
the system being monitored.
To view a report of the probe's results, choose a relevant duration using the date fields
and decide whether you would like to see metric data, the state change history or both.
To obtain metric data, select the metric(s) on which you wish to see a report, and de-
cide via the check boxes whether the results should be shown in a graph, an event log,
Displays the status of your monitoring infrastructure. Anytime you make changes to
your monitoring configuration, such as adding a probe to a system or editing a probe's
thresholds, these changes must be finalized by updating the configuration. To do so,
mark the SUSE Manager Server's check box and click Push Scout Configs. The table on
this page identifies the date and time of requested and completed pushes. The monitor-
ing scout runs all the probes and collects monitoring data.
Clicking the name of a scout opens the SSH public key of the SUSE Manager moni-
toring daemon. This allows you to copy and paste the SSH key to the systems that are
monitored by the scout. This is required for the SUSE Manager network monitoring
daemon to connect to SUSE Manager.
Identifies the contact methods that have been established for your organization. These
methods contain email addresses designated to receive alerts from probes.
The notification methods available to your organization are listed here on the default
Notification screen by user.
To create a new notification method, click on the name of the user to be notified. The
User Details > Notification Methods page appears. Refer to Section 11.1.1.7, “User List
> Active > User Details > Notification Methods — [Mon]” (page 163) for further in-
formation. Click on the title of the notification method to edit the properties of the
method.
To create a notification filter, click the create new notification filter link in the upper
right of the screen. Configure each option listed below and click the Save Filter button
to create the filter.
1. Description: Enter a label that allows you to distinguish this filter from others.
2. Type: Determine what action the filter should take: redirect, acknowledge, suspend,
or supplement the incoming notification.
3. Send to: The Redirect Notification and Supplemental Notification options in step two
require an email address to which to send the notifications. The remaining options
require no email address.
6. Probes in State: Select which probe state(s) relate to the filter. For example, you may
choose to create a supplemental notification for critical probes only. Uncheck the
box to the left of any state you want the filter to ignore.
7. Notifications sent to: Select to which notification recipient this filter applies. You
may, for example, redirect notifications that would normally go to a certain user
if this user is on vacation while leaving all other notifications from the probe un-
changed.
10.Beginning: Enter a date and time for the filter to begin operation.
12.Recurring Duration: Choose how long a recurring filter instance is active. It starts at
the Beginning time specified above. Any notification generated outside the specified
duration is not filtered.
Notification filters cannot be deleted. However, a filter may be canceled. Set the end
date to some time in the past but after the start date or else the change fails. Another
method is to select a set of filters from the Active page and click the Expire Notification
Filters button in the lower right. These filters are then canceled and appear in the Ex-
pired Filters tab.
1 From the Monitoring > Probe Suites page, select the create probe suite link. Enter a
distinct name for the probe suite and a brief description of the suite. Click the Cre-
ate Probe Suite button to continue.
2 Add and configure the probes comprised in the suite. Click the create new probe
link in the upper right.
NOTE
Your mail transfer agent must be configured correctly on your SUSE Man-
ager server, and each client system to which the probe suite is applied
must have the rhnmd daemon installed and running. See the Installation
& Troubleshooting Guide (↑Installation & Troubleshooting Guide) for addi-
tional information.
4 On the "Systems" tab add the systems to which the probe suite applies. Click the
add systems to probe suite link in the upper right of the screen to continue.
5 The next page displays a list of all systems with monitoring entitlements. Check the
box to the left of the system(s) to which you wish to apply the probe suite, select the
monitoring scout you wish to use, and click the Add systems to probe suite button to
create the probe suite.
You can either delete or detach probes from the suite. Detaching a probe disassociates
the probe from the suite and converts it to a system-specific probe. Changes to the de-
tached probe only affect that system. Deleting a probe removes it from the suite and
from all systems.
1 In the Monitoring > Probe Suites page, click on the name of the probe suite you wish
to modify.
You may also remove a system from the probe suite. There are two ways to accom-
plish this. The first method is to detach the system from the probe suite. When you
do so, the system still has the same probes assigned to it. However, you now have the
ability to configure these probes individually without affecting any other systems. For
more information about removing probes from an individual system, refer to Sec-
tion 4.2.14.5, “System Details > Monitoring — [Mon]” (page 49).
1 From the Monitoring > Probe Suites page, click the name of the probe suite you wish
to modify.
3 Check the box next to the system(s) you wish to remove from the probe suite.
The second method is to detach the suite from the system and with it all probes.
NOTE
This action deletes all of the suites' probes from the system as well as time
and event logs. This action is irreversible.
To remove a probe suite from a system and delete all associated probes follow these
steps:
1 On the Monitoring > Probe Suites page, click the name of the probe suite you wish to
remove.
3 Check the box next to the system(s) you wish to remove from the probe suite.
The default monitoring settings are derived from your SUSE Manager installation and
can be changed in Admin > SUSE Manager Configuration > Monitoring. Configure your
organization-wide monitoring infrastructure, change the mail exchange server or the re-
cipient of all administrative emails from SUSE Manager. Beware that modifying this
page causes the monitoring services on the SUSE Manager to reset. This triggers restart
events for the monitoring services on all monitoring-enabled SUSE Manager servers
to ensure they immediately reload the changed configuration. To save and roll out the
changed configuration, click Update Config.
The Setup Wizard link is displayed when the SUSE Manager Web interface is used for
the fist time and can be accessed later at any time by clicking on Admin > Setup Wiz-
ard. On the two tabs configure the HTTP proxy server and mirror credentials.
HTTP Proxy:
Configure a proxy server that SUSE Manager will use to access NCC and other
remote servers here. Use hostname:port syntax in the Hostname field if the
proxy port is not 80. Clearing the fields disables proxy.
Mirror Credentials:
Click Add a new credential and enter email address, username and password to al-
low a user to access NCC. After saving, a new credential card will be displayed.
Buttons below the credential card allow you to:
• see the credential validation status (green tick or red cross icon). To re-
check the credential with NCC, click on the icon;
Admin 175
• set the primary credentials for inter-server synchronization (yellow star
icon);
SUSE Products:
On the SUSE Products page, select product-specific channels you are entitled to.
The products displayed are directly linked to your mirror credentials as well as
your SUSE subscriptions. Add-on products are shown when you select the corre-
sponding base product or click the plus sign to its left. After you have made your
selection, click Add products. This equals running the mgr-ncc-sync --add-
product command.
NOTE
Channel synchronization will take place and might take several hours. Af-
terward the corresponding channels can be used in SUSE Manager.
Alternatively, you can add listed channels right away by clicking the Add this prod-
uct button in the status column. A progress bar will be displayed. Now you can se-
lect add-on products requiring the product that is currently added. To check for re-
quired products, click on the list icon in the Channels column. Once a product is
downloaded and ready to use, the state will change to Finished.
System Entitlements
Here you see all System Entitlements Across SUSE Manager and their usage. Click
on the entitlement's name for more details. Again, the Organizations tab al-
lows you to change allocations in the Proposed Total column, then click Update
for your changes to take effect. For more information on entitlements, refer to
Section “Managing Organization Entitlements” (Chapter 5, Managing Multiple Or-
ganizations, ↑Reference Guide).
Admin 177
13.5.1 Admin > SUSE Manager
Configuration > General
This page allows you to alter the most basic settings, such as the admin email address
or a proxy configuration.
Check boxes offer options for including built-in security SSL and GNU Privacy Guard
(GPG) features, both of which are advised. In addition, you may enable remote com-
mand acceptance and remote configuration management of the systems to be boot-
strapped here. Both features are useful for completing client configuration. Finally,
if you are using an HTTP proxy server, fill in the related fields. When finished, click
Generate Bootstrap Script.
For more information, see the cobbler manpage and Section “Syncing TFTP Con-
tents to SUSE Manager Proxies” (Chapter 7, Cobbler, ↑Reference Guide).
Admin 179
work, so the network segment that connects it to target systems must be properly con-
figured. In particular, a DHCP server must exist and have a next-server configuration
parameter set to the SUSE Manager server IP address or hostname.
Once enabled, any bare-metal system connected to the SUSE Manager server network
will be automatically added to the organization when it powers on. The process typical-
ly takes a few minutes; when it finishes, the system will automatically shut down and
then appear in the Systems list.
NOTE
Note that new systems will be added to the organization of the administrator
who enabled this feature. To change the organization, disable the feature, log
in as an administrator of a different organization and enable it again.
It is possible to use System Set Manager with bare-metal systems, although in that case
some features will not be available as those systems do not have an operating system in-
stalled. This limitation also applies to mixed sets with regular and bare-metal systems:
full features will be enabled again once all bare-metal systems are removed from the
set.
• Allow Slave to Sync? - Choosing this field will allow the slave SUSE Manager to ac-
cess this master SUSE Manager. Otherwise, contact with this slave will be denied.
• Sync all orgs to Slave? - Checking this field will synchronize all organizations to the
slave SUSE Manager.
NOTE
Choosing the Sync All Orgs to Slave? option on the Master Setup page will
override any specifically selected organizations in the local organization ta-
ble.
Click Create. Optionally, click on any local organization to be exported to the slave
SUSE Manager then click Allow Orgs.
• Default Master?
• Filename of this Master's CA Certificate: use the full path to the CA Certificate.
Once the master and slave servers are configured, a synchronization can be performed
by running the mgr-inter-sync command:
mgr-inter-sync -c YOUR-CHANNEL
Admin 181
For more information on inter-server synchronization, see Section “Inter-Server
Synchronization” (Chapter 5, Importing and Synchronizing with Inter-Server Sync, ↑In-
stallation & Troubleshooting Guide).
To complete the mapping, log in to the Slave SUSE Manager as administrator. Click on
Admin > ISS Configuration > Slave Setup and select a master SUSE Manager by click-
ing on its name. Use the drop-down box to map the exported master organization name
to a matching local organization in the slave SUSE Manager, then click Update Map-
ping.
On the command line, issue the synchronization command on each of the custom chan-
nels to obtain the correct trust structure and channel permissions:
mgr-inter-sync -c YOUR-CHANNEL
WARNING
Only disable or delete a schedule if you are absolutely certain this is neces-
sary as they are essential for SUSE Manager to work properly.
The following predefined task bunches are scheduled by default and can be configured:
channel-repodata-default:
(re)generates repository metadata files.
cleanup-data-default:
cleans up stale package change log and monitoring time series data from the data-
base.
clear-taskologs-default:
clears task engine (taskomatic) history data older than a specified number of days,
depending on the job type, from the database.
cobbler-sync-default:
syncs distribution and profile data from SUSE Manager to Cobbler. For more in-
formation on Cobbler, see Chapter 7, Cobbler (↑Reference Guide).
compare-configs-default:
compares configuration files as stored in configuration channels with the files
stored on all configuration-enabled servers. To review comparisons, click on the
Systems tab and click on the system of interest. Go to Configuration > Compare
Files. For more information, refer to Section “System Details > Configuration >
Compare Files ” (page 44).
cve-server-channels-default:
updates internal pre-computed CVE data that is used to display results on the CVE
Audit page. Search results in the CVE Audit page are updated to the last run of this
schedule). For more information, see Section 7.1, “CVE Audit” (page 123).
daily-status-default:
sends daily report emails to relevant addresses. See Section 11.1.1.5, “User List >
Active > User Details > Preferences — [Mgmt]” (page 162) to learn more about
how to configure notifications for specific users.
errata-cache-default:
updates internal patch cache database tables, which are used to look up packages
that need updates for each server. Also, this sends notification emails to users that
might be interested in certain patches. For more information on patches, see Chap-
ter 5, Patches (page 101).
Admin 183
errata-queue-default:
queues automatic updates (patches) for servers that are configured to receive them.
kickstart-cleanup-default:
cleans up stale kickstart session data.
kickstartfile-sync-default:
generates Cobbler files corresponding to Kickstart profiles created by the configu-
ration wizard. For more information on Kickstart profiles, see Section 4.9.4, “Cre-
ate a New Kickstart Profile” (page 86).
mgr-register-default:
calls the mgr-register command, which synchronizes client registration data
with NCC (new, changed or deleted clients' data are forwarded).
package-cleanup-default:
deletes stale package files from the file system.
reboot-action-cleanup-default:
any reboot actions pending for more than six hours are marked as failed and asso-
ciated data is cleaned up in the database. For more information on scheduling re-
boot actions, see Section “ System Details > Provisioning > Power Management —
[Prov]” (page 47).
sandbox-cleanup-default:
cleans up sandbox configuration files and channels that are older than the
sandbox_lifetime configuration parameter (3 days by default). Sandbox files are
those imported from systems or files under development. For more information,
see Section “System Details > Configuration > Add Files ” (page 42)
satcert-check-default:
checks the server certificate and sends email notifications if it is nearing expiration
or already expired.
session-cleanup-default:
cleans up stale Web interface sessions, typically data that is temporarily stored
when a user logs in and then closes the browser before logging out.
ssh-push-default:
prompts clients to check in with SUSE Manager via SSH if they are configured
with a SSH Push contact method. For more information, refer to Section “SSH
Server Push” (Chapter 7, Maintenance, ↑Installation & Troubleshooting Guide)
Admin 185
Help
14
The Help pages provide access to the full suite of documentation and support available
to SUSE Manager users. Click Help in the Overview category to see a list of options
available to you.
Help 187
14.3 SUSE Manager Proxy Quick
Start
SUSE Manager Proxy Server is a package-caching mechanism that reduces the band-
width requirements. Proxy customers cache RPMs, such as patch updates from SUSE
or custom RPMs generated by their organization, on an internal, centrally-located serv-
er. Client systems then receive these updates from the proxy rather than by accessing
the SUSE Manager server individually. The SUSE Manager Proxy Quick Start explains
how to install and set up a SUSE Manager Proxy Server.
The Client Configuration Guide is a best practices manual intended to help customers of
SUSE Manager configure their client systems.
14.7 Search
The Documentation Search page features a robust search engine that indexes and
searches SUSE Manager documentation.
Users can search the available online documentation and filter them according to the
following choices in the What to Search drop-down menu:
• Content & Title — Search both the title heading or body content of all available doc-
uments.
Help 189
• Free Form — Search documents and indices for any keyword matches, which broad-
ens search results.
• Content — Search only the body content of documentation for more specific match-
es.
• Title — Search only the title headings of the documentation for targeted, specific
search results.
The Free Form field additionally allows you to search using field names that you
prepend to search queries and filter results in that field.
For example, if you wanted to search all of the SUSE Manager manuals for the word
Virtualization in the title and install in the content, type the following in
the Free Form field:
title:Virtualization and content:install
If there are several pages of search results, you can limit the amount of visible results
shown on one page by clicking the Display quantity items per page drop-down menu,
which offers between 10 and 500 results per page.
To move between pages, click the right or left angle brackets (> to go forward or < to
go backward).
Section “System Details > Software > Software Crashes — [Mgmt] ” (page 40)
Added description how to few reports of software failures.
Section “ System Details > Provisioning > Power Management — [Prov]” (page 47)
Added power management feature.
Section 4.4.11.7, “System Set Manager > Misc > Reboot — [Mgmt]” (page 65)
Documented reboot feature.